Information Fusion for Cyber-Security Analytics

Nonfiction, Science & Nature, Technology, Electronics, Circuits, Telecommunications
Cover of the book Information Fusion for Cyber-Security Analytics by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319442570
Publisher: Springer International Publishing Publication: October 21, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319442570
Publisher: Springer International Publishing
Publication: October 21, 2016
Imprint: Springer
Language: English

This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers.

More books from Springer International Publishing

Cover of the book 129 Xe Relaxation and Rabi Oscillations by
Cover of the book A Cp-Theory Problem Book by
Cover of the book Multichannel Commerce by
Cover of the book Bernard Shaw, W. T. Stead, and the New Journalism by
Cover of the book From Agriscience to Agribusiness by
Cover of the book Internet Science by
Cover of the book Innovative Quality Improvements in Operations by
Cover of the book Authentic Leadership and Followership by
Cover of the book Pitfalls in Musculoskeletal Radiology by
Cover of the book Learning and Teaching Real World Problem Solving in School Mathematics by
Cover of the book How Does Government Listen to Scientists? by
Cover of the book Social Structure, Value Orientations and Party Choice in Western Europe by
Cover of the book Economics of Grids, Clouds, Systems, and Services by
Cover of the book Pediatric Dialysis Case Studies by
Cover of the book Data and Applications Security and Privacy XXIX by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy