語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Data Science in Cybersecurity and Cy...
~
Choo, Kim-Kwang Raymond.
Data Science in Cybersecurity and Cyberthreat Intelligence
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Data Science in Cybersecurity and Cyberthreat Intelligence/ edited by Leslie F. Sikos, Kim-Kwang Raymond Choo.
其他作者:
Choo, Kim-Kwang Raymond.
面頁冊數:
XII, 129 p. 45 illus., 25 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer Crime. -
電子資源:
https://doi.org/10.1007/978-3-030-38788-4
ISBN:
9783030387884
Data Science in Cybersecurity and Cyberthreat Intelligence
Data Science in Cybersecurity and Cyberthreat Intelligence
[electronic resource] /edited by Leslie F. Sikos, Kim-Kwang Raymond Choo. - 1st ed. 2020. - XII, 129 p. 45 illus., 25 illus. in color.online resource. - Intelligent Systems Reference Library,1771868-4394 ;. - Intelligent Systems Reference Library,67.
The Formal Representation of Cyberthreats for Automated Reasoning -- A Logic Programming Approach to Predict Enterprise-Targeted Cyberattacks -- Discovering Malicious URLs Using Machine Learning Techniques -- Machine Learning and Big Data Processing for Cybersecurity Data Analysis -- Systematic Analysis of Security Implementation for Internet of Health Things in Mobile Health Networks -- Seven Pitfalls of Using Data Science in Cybersecurity.
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.
ISBN: 9783030387884
Standard No.: 10.1007/978-3-030-38788-4doiSubjects--Topical Terms:
1226852
Computer Crime.
LC Class. No.: TA345-345.5
Dewey Class. No.: 620.00285
Data Science in Cybersecurity and Cyberthreat Intelligence
LDR
:02931nam a22004215i 4500
001
1021705
003
DE-He213
005
20200703191221.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030387884
$9
978-3-030-38788-4
024
7
$a
10.1007/978-3-030-38788-4
$2
doi
035
$a
978-3-030-38788-4
050
4
$a
TA345-345.5
072
7
$a
UN
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UN
$2
thema
072
7
$a
TB
$2
thema
082
0 4
$a
620.00285
$2
23
245
1 0
$a
Data Science in Cybersecurity and Cyberthreat Intelligence
$h
[electronic resource] /
$c
edited by Leslie F. Sikos, Kim-Kwang Raymond Choo.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XII, 129 p. 45 illus., 25 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Intelligent Systems Reference Library,
$x
1868-4394 ;
$v
177
505
0
$a
The Formal Representation of Cyberthreats for Automated Reasoning -- A Logic Programming Approach to Predict Enterprise-Targeted Cyberattacks -- Discovering Malicious URLs Using Machine Learning Techniques -- Machine Learning and Big Data Processing for Cybersecurity Data Analysis -- Systematic Analysis of Security Implementation for Internet of Health Things in Mobile Health Networks -- Seven Pitfalls of Using Data Science in Cybersecurity.
520
$a
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.
650
2 4
$a
Computer Crime.
$3
1226852
650
2 4
$a
Cybercrime.
$3
1109747
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Computational Intelligence.
$3
768837
650
1 4
$a
Data Engineering.
$3
1226308
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computational intelligence.
$3
568984
650
0
$a
Engineering—Data processing.
$3
1297966
700
1
$a
Choo, Kim-Kwang Raymond.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
895890
700
1
$a
Sikos, Leslie F.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
886056
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030387877
776
0 8
$i
Printed edition:
$z
9783030387891
776
0 8
$i
Printed edition:
$z
9783030387907
830
0
$a
Intelligent Systems Reference Library,
$x
1868-4394 ;
$v
67
$3
1253823
856
4 0
$u
https://doi.org/10.1007/978-3-030-38788-4
912
$a
ZDB-2-INR
912
$a
ZDB-2-SXIT
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
950
$a
Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入