๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Information Fusion for Cyber-Security Analytics

โœ Scribed by Aleroud, Ahmed;Alsmadi, Izzat M.;Karabatis, George


Publisher
Springer International Publishing
Year
2017;2018
Tongue
English
Leaves
379
Series
Studies in Computational Intelligence 691
Edition
1st edition
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Introduction.- Part 1: Information Fusion for Cyber-Security Analytics.- Activity Information Fusion for Security Analytics.- Location Information Fusion for Security Analytics.- Time Information Fusion for Security Analytics.- Individuality Information Fusion for Security Analytics.- Relation Information Fusion for Security Analytics.- Part 2: Trends in Using Information Fusion Techniques to Discover Cyber Threats.- Big Data Fusion for Predicting Network Threats.- Using Software Defined Networks for Cyber Threat Discovery.- Privacy Preserving Information Fusion for Analyzing Network Data.- Using Information Fusion to Discover Zero-Day Attacks.- Enhancing Social Network Privacy and Security Using Graph-based Data Fusion.- Using Information Fusion to discover Cyber-threats in Wireless Sensor Networks.- Information Fusion for Improving Privacy and Security in Healthcare Applications.- Predicting Social Engineering Attacks Using Information Fusion Techniques.- Part 3: Applications and tools. -Information Fusion Application and Tools for Cyber Security Analytics.- Conclusion.

โœฆ Subjects


Attack prediction models;(BIC subject category)KJQ;(BIC subject category)TJFC;(BIC subject category)TJK;(BIC subject category)UR;(BISAC Subject Heading)BUS070030;(BISAC Subject Heading)COM053000;(BISAC Subject Heading)TEC008010;(BISAC Subject Heading)TEC041000;(BISAC Subject Heading)TJK;Cyber security;IDS technologies;Information fusion;Information Fusion for Security Analytics;Knowledge-based Intrusion Detection Systems (IDSs);(Produktform)Paperback / softback;(Springer Nature Marketing Classif


๐Ÿ“œ SIMILAR VOLUMES


Information Fusion for Cyber-Security An
โœ Izzat M Alsmadi, George Karabatis, Ahmed Aleroud (eds.) ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p>This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on infor

GDPR and Cyber Security for Business Inf
โœ Antoni Gobeo, Connor Fowler, William J. Buchanan ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› River Publishers ๐ŸŒ English

<span>The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals included under its terms; ultimately the priv

Data Analysis for Network Cyber-Security
โœ Niall Adams, Nicholas Heard, Niall Adams, Nicholas Heard ๐Ÿ“‚ Library ๐Ÿ“… 2014 ๐Ÿ› World Scientific Publishing Company ๐ŸŒ English

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyz

The NICE Cyber Security Framework: Cyber
โœ Izzat Alsmadi ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Springer ๐ŸŒ English

<p><span>This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency- Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) de