Information Fusion for Cyber-Security Analytics

Nonfiction, Science & Nature, Technology, Electronics, Circuits, Telecommunications
Cover of the book Information Fusion for Cyber-Security Analytics by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319442570
Publisher: Springer International Publishing Publication: October 21, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319442570
Publisher: Springer International Publishing
Publication: October 21, 2016
Imprint: Springer
Language: English

This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers.

More books from Springer International Publishing

Cover of the book Operations Research and Enterprise Systems by
Cover of the book Techniques and Environments for Big Data Analysis by
Cover of the book Speaking in Court by
Cover of the book Hierarchical Type-2 Fuzzy Aggregation of Fuzzy Controllers by
Cover of the book Pocket Guide to Kidney Stone Prevention by
Cover of the book Principle and Application Progress in Location-Based Services by
Cover of the book Economic Transformation and Business Opportunities in Asia by
Cover of the book SDN and NFV Security by
Cover of the book Hermeneutics of Human-Animal Relations in the Wake of Rewilding by
Cover of the book Microbiota of the Human Body by
Cover of the book Pharmacovigilance in Psychiatry by
Cover of the book Decentralization and Governance in Indonesia by
Cover of the book The Mass Deportation of Poles to Siberia, 1863-1880 by
Cover of the book Passenger Car Tires and Wheels by
Cover of the book Historians as Expert Judicial Witnesses in Tobacco Litigation by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy