The application of data warehousing and data mining techniques to computer security is an important emerging area, as information processing and internet accessibility costs decline and more and more organizations become vulnerable to cyber attacks. These security breaches include attacks on single
Mining Massive Data Sets for Security: Advances in Data Mining, Search, Social Networks and Text Mining, and their Applications to Security - Volume 19 ... Information and Communication Security)
โ Scribed by F. Fogelman-Soulie
- Publisher
- IOS Press
- Year
- 2008
- Tongue
- English
- Leaves
- 389
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The real power for security applications will come from the synergy of academic and commercial research focusing on the specific issue of security. Special constraints apply to this domain, which are not always taken into consideration by academic research, but are critical for successful security applications: large volumes: techniques must be able to handle huge amounts of data and perform 'on-line' computation; scalability: algorithms must have processing times that scale well with ever growing volumes; automation: the analysis process must be automated so that information extraction can 'run on its own'; ease of use: everyday citizens should be able to extract and assess the necessary information; and robustness: systems must be able to cope with data of poor quality (missing or erroneous data). The NATO Advanced Study Institute (ASI) on Mining Massive Data Sets for Security, held in Italy, September 2007, brought together around ninety participants to discuss these issues. This publication includes the most important contributions, but can of course not entirely reflect the lively interactions which allowed the participants to exchange their views and share their experience. The bridge between academic methods and industrial constraints is systematically discussed throughout. This volume will thus serve as a reference book for anyone interested in understanding the techniques for handling very large data sets and how to apply them in conjunction for solving security issues.IOS Press is an international science, technical and medical publisher of high-quality books for academics, scientists, and professionals in all fields. Some of the areas we publish in: -Biomedicine -Oncology -Artificial intelligence -Databases and information systems -Maritime engineering -Nanotechnology -Geoengineering -All aspects of physics -E-governance -E-commerce -The knowledge economy -Urban studies -Arms control -Understanding and responding to terrorism -Medical informatics -Computer Sciences
โฆ Table of Contents
Title page......Page 2
Mining Massive Data Sets for Security......Page 6
Contents......Page 8
Data Mining......Page 12
Learning Using Hidden Information: Master-Class Learning......Page 14
Learning Using Large Datasets......Page 26
Practical Feature Selection: From Correlation to Causality......Page 38
Industrial Mining of Massive Data Sets......Page 55
Large-Scale Semi-Supervised Learning......Page 73
User Modeling and Machine Learning: A Survey......Page 87
Smoothness and Sparsity Tuning for Semi-Supervised SVM......Page 96
Distributed Categorizer for Large Category Systems......Page 98
Data Stream Management and Mining......Page 100
Modelling and Analysing Systems of Agents by Agent-Aware Transition Systems......Page 114
Search......Page 124
The "Real World" Web Search Problem: Bridging the Gap Between Academic and Commercial Understanding of Issues and Methods......Page 126
Website Privacy Preservation for Query Log Publishing......Page 141
Fighting Web Spam......Page 145
Social Networks......Page 166
Emergent Patterns in Online Coactivity......Page 168
Diffusion and Cascading Behavior in Networks......Page 180
Link Analysis in Networks of Entities......Page 197
Evolving Networks......Page 209
Mining Networks Through Visual Analytics: Incremental Hypothesis Building and Validation......Page 215
A Review of Anomaly Detection on Graphs......Page 223
Text Mining......Page 226
Using Language-Independent Rules to Achieve High Multilinguality in Text Mining......Page 228
Mining the Web to Build a Complete, Large-Scale Language Model......Page 252
Integrating Text Mining and Link Analysis......Page 254
Using Linguistic Information as Features for Text Categorization......Page 256
Security Applications......Page 266
Statistical Techniques for Fraud Detection, Prevention and Assessment......Page 268
Fitting Mixtures of Regression Lines with the Forward Search......Page 282
Money Laundering Detection Using Data Mining......Page 298
Text Mining from the Web for Medical Intelligence......Page 306
Learning to Populate an Ontology of Politically Motivated Violent Events......Page 322
Filtering Multilingual Terrorist Content with Graph-Theoretic Classification Tools......Page 334
Open Source Intelligence......Page 342
Detecting Core Members in Terrorist Networks: A Case Study......Page 356
Geolocalisation in Cellular Telephone Networks......Page 368
Machine Learning for Intrusion Detection......Page 377
Subject Index......Page 386
Author Index......Page 388
๐ SIMILAR VOLUMES
<P>Reflects a decade of leading-edge research on intelligence and security informatics. </P> <P>Dr Chen is researcher at the Artificial Intelligence Laboratory and the NSF COPLINK Center for Homeland Security Information Technology Research. </P> <P>Describes real-world community situations. </P> <P
<p><P>On September 11, 2001 the World became cognizant of the security challenges it faces on an international scale. With this awareness a commitment has come from the scientific, engineering, and health communities to help the world meet an array of security challenges. From these activities the s
"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer sec
<div><br></div><div>This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart cities. This book aims to attract works on multidisciplinary research spanning across the computer science and engineering, environm