Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
Advances in Information Security

Data Warehousing and Data Mining Techniques for Cyber Security

    • ٥٫٠ - ١ تقييم
    • ‏129٫99 US$
    • ‏129٫99 US$

وصف الناشر

Data warehousing and data mining provide techniques for collecting information from distributed databases and for performing data analysis. The ever expanding, tremendous amount of data collected and stored in large databases has far exceeded our human ability to comprehend--without the proper tools. There is a critical need for data analysis that can automatically analyze data, summarize it and predict future trends. In the modern age of Internet connectivity, concerns about denial of service attacks, computer viruses and worms are extremely important.

Data Warehousing and Data Mining Techniques for Cyber Security contributes to the discipline of security informatics. The author discusses topics that intersect cyber security and data mining, while providing techniques for improving cyber security. Since the cost of information processing and internet accessibility is dropping, an increasing number of organizations are becoming vulnerable to cyber attacks. This volume introduces techniques for applications in the area of retail, finance, and bioinformatics, to name a few.

Data Warehousing and Data Mining Techniques for Cyber Security is designed for practitioners and researchers in industry. This book is also suitable for upper-undergraduate and graduate-level students in computer science.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٠٧
٦ أبريل
اللغة
EN
الإنجليزية
عدد الصفحات
١٧٣
الناشر
Springer US
البائع
Springer Nature B.V.
الحجم
١٫٣
‫م.ب.‬
Machine Learning and Data Mining for Computer Security Machine Learning and Data Mining for Computer Security
٢٠٠٦
Deployable Machine Learning for Security Defense Deployable Machine Learning for Security Defense
٢٠٢٠
Intelligent Multimedia Analysis for Security Applications Intelligent Multimedia Analysis for Security Applications
٢٠١١
Machine Learning in Cyber Trust Machine Learning in Cyber Trust
٢٠٠٩
Data Science for Cyber-Security Data Science for Cyber-Security
٢٠١٨
Information Systems Security Information Systems Security
٢٠٢٢
Quantitative Security Risk Assessment of Enterprise Networks Quantitative Security Risk Assessment of Enterprise Networks
٢٠١١
Data and Applications Security and Privacy XXXIV Data and Applications Security and Privacy XXXIV
٢٠٢٠
Network Security Metrics Network Security Metrics
٢٠١٧
Secure Cloud Computing Secure Cloud Computing
٢٠١٤
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
٢٠٠٩
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
٢٠١٦
Security for Telecommunications Networks Security for Telecommunications Networks
٢٠٠٨
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
٢٠١٥
Network Security Policies and Procedures Network Security Policies and Procedures
٢٠٠٧
Autonomous Intelligent Cyber Defense Agent (AICA) Autonomous Intelligent Cyber Defense Agent (AICA)
٢٠٢٣