We use cookies to provide essential features and services. By using our website you agree to our use of cookies .

×

Warehouse Stock Clearance Sale

Grab a bargain today!


Big Data Analytics with Applications in Insider Threat Detection
By

Rating

Product Description
Product Details

Table of Contents

Supporting Technologies. Introduction. Data Mining Techniques. Cyber Security and Malware. Data Mining for Malware Detection. Conclusion. Stream-Based Novel Class Detection. Stream Mining. Novel Class Detection Problem. SNOD. Conclusion. Reactively Adaptive Malware. Reactively Adaptive Malware. RAMAL Design. RAMAL Implementation. SNODMAL. Introduction. SNODMAL Design. SNODMAL Implementation. SNODMAL FOR RAMAL. SNODMAL Extensions. Introduction. SNODMAL on the Cloud. SNODCAL. SNODMAL++. Conclusion. Summary and Directions. References. Appendix A: Data Management Systems. Appendix B: Malware Products.

About the Author

Dr. Bhavani Thuraisingham is the Louis A. Beecherl, Jr. Distinguished Professor of Computer Science and the Executive Director of the Cyber Security Research and Education Institute (CSI) at the University of Texas at Dallas.


 Dr. Kevin W. Hamlen is an Assistant Professor in CS at UTD where he directs the Software Security Lab.


Dr. Latifur R. Khan is currently an Associate Professor in CS at UTD.


Dr. Mehedy Masud is an associate professor at the College of Information Technology, United Arab Emirates University.

Ask a Question About this Product More...
 
Look for similar items by category
People also searched for
Item ships from and is sold by Fishpond.com, Inc.

Back to top