Information Fusion for Cyber-Security Analytics

This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Alsmadi, Izzat M. (Επιμελητής έκδοσης), Karabatis, George (Επιμελητής έκδοσης), Aleroud, Ahmed (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2017.
Σειρά:Studies in Computational Intelligence, 691
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03931nam a22005295i 4500
001 978-3-319-44257-0
003 DE-He213
005 20161021112347.0
007 cr nn 008mamaa
008 161021s2017 gw | s |||| 0|eng d
020 |a 9783319442570  |9 978-3-319-44257-0 
024 7 |a 10.1007/978-3-319-44257-0  |2 doi 
040 |d GrThAP 
050 4 |a TK1-9971 
072 7 |a TJK  |2 bicssc 
072 7 |a TEC041000  |2 bisacsh 
082 0 4 |a 621.382  |2 23 
245 1 0 |a Information Fusion for Cyber-Security Analytics  |h [electronic resource] /  |c edited by Izzat M Alsmadi, George Karabatis, Ahmed Aleroud. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a X, 379 p. 85 illus., 61 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Studies in Computational Intelligence,  |x 1860-949X ;  |v 691 
505 0 |a Introduction -- Part 1: Information Fusion for Cyber-Security Analytics -- Activity Information Fusion for Security Analytics -- Location Information Fusion for Security Analytics -- Time Information Fusion for Security Analytics -- Individuality Information Fusion for Security Analytics -- Relation Information Fusion for Security Analytics -- Part 2: Trends in Using Information Fusion Techniques to Discover Cyber Threats -- Big Data Fusion for Predicting Network Threats -- Using Software Defined Networks for Cyber Threat Discovery -- Privacy Preserving Information Fusion for Analyzing Network Data -- Using Information Fusion to Discover Zero-Day Attacks -- Enhancing Social Network Privacy and Security Using Graph-based Data Fusion -- Using Information Fusion to discover Cyber-threats in Wireless Sensor Networks -- Information Fusion for Improving Privacy and Security in Healthcare Applications -- Predicting Social Engineering Attacks Using Information Fusion Techniques -- Part 3: Applications and tools. -Information Fusion Application and Tools for Cyber Security Analytics -- Conclusion. 
520 |a This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers. . 
650 0 |a Engineering. 
650 0 |a Big data. 
650 0 |a Computer security. 
650 0 |a Electrical engineering. 
650 0 |a Electronic circuits. 
650 1 4 |a Engineering. 
650 2 4 |a Communications Engineering, Networks. 
650 2 4 |a Circuits and Systems. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Big Data/Analytics. 
700 1 |a Alsmadi, Izzat M.  |e editor. 
700 1 |a Karabatis, George.  |e editor. 
700 1 |a Aleroud, Ahmed.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319442563 
830 0 |a Studies in Computational Intelligence,  |x 1860-949X ;  |v 691 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-44257-0  |z Full Text via HEAL-Link 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647)