<p>This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis. Cyber-attacks have posed real and wide-ranging threats for the information society. Detectin
Data analytics and decision support for cybersecurity : trends, methodologies and applications
β Scribed by Huang, Yan; Kalutarage, Harsha Kumara; Palomares Carrascosa, IvΓ‘n
- Publisher
- Springer International Publishing
- Year
- 2017
- Tongue
- English
- Leaves
- 278
- Series
- Data Analytics
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks. The recent advent of Big Data paradigms and the use of data science methods, has resulted in a higher demand for effective data-driven models that support decision-making at a strategic level. This motivates the need for defining Read more...
Abstract: The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks. The recent advent of Big Data paradigms and the use of data science methods, has resulted in a higher demand for effective data-driven models that support decision-making at a strategic level. This motivates the need for defining novel data analytics and decision support approaches in a myriad of real-life scenarios and problems, with Cybersecurity-related domains being no exception. This contributed volume comprises nine chapters, written by leading international researchers, covering a compilation of recent advances in Cybersecurity-related applications of data analytics and decision support approaches. In addition to theoretical studies and overviews of existing relevant literature, this book comprises a selection of application-oriented research contributions. The investigations undertaken across these chapters focus on diverse and critical Cybersecurity problems, such as Intrusion Detection, Insider Threats, Insider Threats, Collusion Detection, Run-Time Malware Detection, Intrusion Detection, E-Learning, Online Examinations, Cybersecurity noisy data removal, Secure Smart Power Systems, Security Visualization and Monitoring. Researchers and professionals alike will find the chapters an essential read for further research on the topic
β¦ Table of Contents
Front Matter ....Pages i-xvi
Front Matter ....Pages 1-1
A Toolset for Intrusion and Insider Threat Detection (Markus Ring, Sarah Wunderlich, Dominik GrΓΌdl, Dieter Landes, Andreas Hotho)....Pages 3-31
Human-Machine Decision Support Systems for Insider Threat Detection (Philip A. Legg)....Pages 33-53
Detecting Malicious Collusion Between Mobile Software Applications: The AndroidTM Case (Irina MΔriuca AsΔvoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen et al.)....Pages 55-97
Dynamic Analysis of Malware Using Run-Time Opcodes (Domhnall Carlin, Philip OβKane, Sakir Sezer)....Pages 99-125
Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models (Nour Moustafa, Gideon Creech, Jill Slay)....Pages 127-156
Security of Online Examinations (Yousef W. Sabbah)....Pages 157-200
Attribute Noise, Classification Technique, and Classification Accuracy (R. Indika P. Wickramasinghe)....Pages 201-220
Front Matter ....Pages 221-221
Learning from Loads: An Intelligent System for Decision Support in Identifying Nodal Load Disturbances of Cyber-Attacks in Smart Power Systems Using Gaussian Processes and Fuzzy Inference (Miltiadis Alamaniotis, Lefteri H. Tsoukalas)....Pages 223-241
Visualization and Data Provenance Trends in Decision Support for Cybersecurity (Jeffery Garae, Ryan K. L. Ko)....Pages 243-270
β¦ Subjects
Computer security -- Decision making;COMPUTERS / Computer Literacy;COMPUTERS / Computer Science;COMPUTERS / Data Processing;COMPUTERS / Hardware / General;COMPUTERS / Information Technology;COMPUTERS / Machine Theory;COMPUTERS / Reference;Computer Science;Data Mining and Knowledge Discovery;Data Encryption;Big Data/Analytics
π SIMILAR VOLUMES
<p>It is a great privilege and pleasure to write a foreword for a book honorΒ ing Wolfgang Gaul on the occasion of his sixtieth birthday. Wolfgang Gaul is currently Professor of Business Administration and Management Science and the Head of the Institute of Decision Theory and Management Science, Fa
<p>The book aims at giving the methodological framework for design decision support systems. Several applications are also described in detail, ranging from environment control, production planning, transportation planning. The book is of special interest to operations researchers, environment speci
<span><p>This book investigates the role of data mining in computational statistics for machine learning. It offers applications that can be used in various domains and examines the role of transformation functions in optimizing problem statements. </p></span>
<p><span>With the rapidly advancing fields of Data Analytics and Computational Statistics, itβs important to keep up with current trends, methodologies, and applications. This book investigates the role of data mining in computational statistics for machine learning. It offers applications that can