The Locator -- [(subject = "Data Mining")]

862 records matched your query       


Record 19 | Previous Record | Long Display | Next Record
02737aam a2200337 i 4500
001 E1FA07E4E97711ED8437380758ECA4DB
003 SILO
005 20230503010033
008 211009t20222022enka     b    001 0 eng  
010    $a 2021046596
020    $a 110841527X
020    $a 9781108415279
035    $a (OCoLC)1273679678
040    $a LBSOR/DLC $b eng $e rda $c DLC $d OCLCF $d OCLCO $d UKMGB $d OCLCO $d CDX $d YDX $d SILO
042    $a pcc
050 00 $a QA76.9 A25 J37 2022
084    $a COM053000 $2 bisacsh
100 1  $a Janeja, Vandana P., $d 1976- $e author.
245 10 $a Data analytics for cybersecurity / $c Vandana P. Janeja.
264  1 $a Cambridge, United Kingdom ; $b Cambridge University Press, $c 2022.
300    $a xiii, 192 pages : $b illustrations ; $c 24 cm
504    $a Includes bibliographical references (pages 165-188) and index.
505 0  $a Introduction -- data analytics for cybersecurity -- Understanding sources of cybersecurity data -- Introduction to data mining : clustering, classification and association rule mining -- Big data analytics and its need for cybersecurity -- Types of cyber attacks -- Anomaly detection for cyber security -- Anomaly detection -- Cybersecurity through time series and spatial data -- Cybersecurity through network and graph data -- Human centered data analytics for cyber security -- Future directions in data analytics for cybersecurity.
520    $a "As the world becomes increasingly connected, it is also more exposed to a myriad of cyber threats. We need to use multiple types of tools and techniques to learn and understand the evolving threat landscape. Data is a common thread linking various types of devices and end users. Analyzing data across different segments of cybersecurity domains, particularly data generated during cyber-attacks, can help us understand threats better, prevent future cyber-attacks, and provide insights into the evolving cyber threat landscape. This book takes a data oriented approach to studying cyber threats, showing in depth how traditional methods such as anomaly detection can be extended using data analytics and also applies data analytics to non-traditional views of cybersecurity, such as multi domain analysis, time series and spatial data analysis, and human-centered cybersecurity"-- $c Provided by publisher.
650  0 $a Computer security $x Data processing.
650  0 $a Data mining.
776 08 $i Online version: $a Janeja, Vandana P, 1976- $t Data analytics for cybersecurity $d Cambridge ; New York, NY : Cambridge University Press, 2022 $z 9781108231954 $w (DLC)  2021046597
941    $a 1
952    $l USUX851 $d 20230804011828.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=E1FA07E4E97711ED8437380758ECA4DB
994    $a C0 $b IWA

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.