Big data analytics with applications in insider threat detection / Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan.
Material type:
- 9781498705479 (hb : alk. paper)
- 005.8 THU-BÂ 23
- QA76.9.A25Â P384 2017
Item type | Current library | Collection | Shelving location | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|---|
![]() |
BITS Pilani Hyderabad | 003-007 | General Stack (For lending) | 005.8 THU-B (Browse shelf(Opens below)) | Available | 37523 |
Browsing BITS Pilani Hyderabad shelves, Shelving location: General Stack (For lending), Collection: 003-007 Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 SUJ-R Cyber security applications for industry 4.0 / | 005.8 TAR-I Threat modeling : a practical guide for development teams / | 005.8 THO-T Network security first-step / | 005.8 THU-B Big data analytics with applications in insider threat detection / | 005.8 TRi-S Introduction to information security and cyber laws / | 005.8 UME-J World beyond digital rights management / | 005.8 VAC-J Cloud computing security : foundations and challenges / edited by |
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.
Includes bibliographical references.
There are no comments on this title.