TY - BOOK AU - Thuraisingham,Bhavani TI - Big data analytics with applications in insider threat detection SN - 9781498705479 (hb : alk. paper) AV - QA76.9.A25 P384 2017 U1 - 005.8 THU-B 23 PY - 2018/// CY - Boca Raton PB - CRC Press KW - Computer security KW - Data processing KW - Malware (Computer software) KW - Big data KW - Computer crimes KW - Investigation KW - Computer networks KW - Access control N1 - Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection; Includes bibliographical references ER -