Information Fusion for Cyber-Security Analytics
โ Scribed by Aleroud, Ahmed;Alsmadi, Izzat M.;Karabatis, George
- Publisher
- Springer International Publishing
- Year
- 2017;2018
- Tongue
- English
- Leaves
- 379
- Series
- Studies in Computational Intelligence 691
- Edition
- 1st edition
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Introduction.- Part 1: Information Fusion for Cyber-Security Analytics.- Activity Information Fusion for Security Analytics.- Location Information Fusion for Security Analytics.- Time Information Fusion for Security Analytics.- Individuality Information Fusion for Security Analytics.- Relation Information Fusion for Security Analytics.- Part 2: Trends in Using Information Fusion Techniques to Discover Cyber Threats.- Big Data Fusion for Predicting Network Threats.- Using Software Defined Networks for Cyber Threat Discovery.- Privacy Preserving Information Fusion for Analyzing Network Data.- Using Information Fusion to Discover Zero-Day Attacks.- Enhancing Social Network Privacy and Security Using Graph-based Data Fusion.- Using Information Fusion to discover Cyber-threats in Wireless Sensor Networks.- Information Fusion for Improving Privacy and Security in Healthcare Applications.- Predicting Social Engineering Attacks Using Information Fusion Techniques.- Part 3: Applications and tools. -Information Fusion Application and Tools for Cyber Security Analytics.- Conclusion.
โฆ Subjects
Attack prediction models;(BIC subject category)KJQ;(BIC subject category)TJFC;(BIC subject category)TJK;(BIC subject category)UR;(BISAC Subject Heading)BUS070030;(BISAC Subject Heading)COM053000;(BISAC Subject Heading)TEC008010;(BISAC Subject Heading)TEC041000;(BISAC Subject Heading)TJK;Cyber security;IDS technologies;Information fusion;Information Fusion for Security Analytics;Knowledge-based Intrusion Detection Systems (IDSs);(Produktform)Paperback / softback;(Springer Nature Marketing Classif
๐ SIMILAR VOLUMES
<p><p>This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on infor
<span>The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals included under its terms; ultimately the priv
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyz
<p><span>This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency- Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) de