Network Science and Cybersecurity

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Network Science and Cybersecurity by , Springer New York
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781461475972
Publisher: Springer New York Publication: June 14, 2013
Imprint: Springer Language: English
Author:
ISBN: 9781461475972
Publisher: Springer New York
Publication: June 14, 2013
Imprint: Springer
Language: English

Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of  Defense, industry and academic laboratories.

This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks.  These attacks  may not yet be known or have well-developed signatures.  Methods are also suggested to simplify the construction of metrics in such a manner that they retain their ability to effectively cluster data, while simultaneously easing human interpretation of outliers.

This is a professional book for practitioners or government employees working in cybersecurity, and can also be used as a reference.  Advanced-level students in computer science or electrical engineering studying security will also find this book useful . 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of  Defense, industry and academic laboratories.

This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks.  These attacks  may not yet be known or have well-developed signatures.  Methods are also suggested to simplify the construction of metrics in such a manner that they retain their ability to effectively cluster data, while simultaneously easing human interpretation of outliers.

This is a professional book for practitioners or government employees working in cybersecurity, and can also be used as a reference.  Advanced-level students in computer science or electrical engineering studying security will also find this book useful . 

More books from Springer New York

Cover of the book Models, Algorithms, and Technologies for Network Analysis by
Cover of the book The Formation and Evolution of M33 as Revealed by Its Star Clusters by
Cover of the book Amorphous Chalcogenide Semiconductors and Related Materials by
Cover of the book Thermo-Hydrodynamic Design of Fluidized Bed Combustors by
Cover of the book Sustainable Development of Biofuels in Latin America and the Caribbean by
Cover of the book The H-Function by
Cover of the book Synaptic Plasticity in Pain by
Cover of the book Genitourinary Pathology by
Cover of the book Handbook of Religion and Spirituality in Social Work Practice and Research by
Cover of the book Reviews of Environmental Contamination and Toxicology by
Cover of the book Work and Mental Health in Social Context by
Cover of the book Clinical Decisions in Nephrology, Hypertension and Kidney Transplantation by
Cover of the book Animal Models of Behavior Genetics by
Cover of the book Multisensory Object Perception in the Primate Brain by
Cover of the book Handbook of Quantitative Criminology by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy