Information fusion for cyber-security analytics

This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information...

Full description

Saved in:
Bibliographic Details
Other Authors: Alsmadi, Izzat, 1972- (Editor), Karabatis, George, (Editor), Aleroud, Ahmed, (Editor)
Format: eBook
Language: English
Published: Cham, Switzerland : Springer, [2016]
Series: Studies in computational intelligence ; v. 691.
Subjects:
ISBN: 9783319442570
9783319442563
Physical Description: 1 online resource (x, 379 pages) : illustrations (some color)

Cover

Table of contents

LEADER 04198cam a2200469Ii 4500
001 99489
003 CZ-ZlUTB
005 20240914111936.0
006 m o d
007 cr cnu|||unuuu
008 161026t20162017sz a o 001 0 eng d
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d YDX  |d OCLCF  |d OCLCQ  |d UAB  |d IOG  |d MERER  |d ESU  |d Z5A  |d OCLCQ  |d JBG  |d IAD  |d ICW  |d ICN  |d OTZ  |d U3W  |d OCLCA  |d CAUOI  |d KSU  |d EBLCP  |d UKMGB  |d OCLCQ 
020 |a 9783319442570  |q (electronic bk.) 
020 |z 9783319442563  |q (print) 
024 7 |a 10.1007/978-3-319-44257-0  |2 doi 
035 |a (OCoLC)961211090  |z (OCoLC)962011344  |z (OCoLC)962127376 
245 0 0 |a Information fusion for cyber-security analytics /  |c Izzat M Alsmadi, George Karabatis, Ahmed Aleroud, editors. 
264 1 |a Cham, Switzerland :  |b Springer,  |c [2016] 
264 4 |c ©2017 
300 |a 1 online resource (x, 379 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
490 1 |a Studies in computational intelligence,  |x 1860-949X ;  |v volume 691 
500 |a Includes index. 
505 0 |a Introduction -- Part 1: Information Fusion for Cyber-Security Analytics -- Activity Information Fusion for Security Analytics -- Location Information Fusion for Security Analytics -- Time Information Fusion for Security Analytics -- Individuality Information Fusion for Security Analytics -- Relation Information Fusion for Security Analytics -- Part 2: Trends in Using Information Fusion Techniques to Discover Cyber Threats -- Big Data Fusion for Predicting Network Threats -- Using Software Defined Networks for Cyber Threat Discovery -- Privacy Preserving Information Fusion for Analyzing Network Data -- Using Information Fusion to Discover Zero-Day Attacks -- Enhancing Social Network Privacy and Security Using Graph-based Data Fusion -- Using Information Fusion to discover Cyber-threats in Wireless Sensor Networks -- Information Fusion for Improving Privacy and Security in Healthcare Applications -- Predicting Social Engineering Attacks Using Information Fusion Techniques -- Part 3: Applications and tools. -Information Fusion Application and Tools for Cyber Security Analytics -- Conclusion. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers. . 
590 |a SpringerLink  |b Springer Complete eBooks 
650 0 |a Intrusion detection systems (Computer security) 
650 0 |a Computer security. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Alsmadi, Izzat,  |d 1972-  |e editor. 
700 1 |a Karabatis, George,  |e editor. 
700 1 |a Aleroud, Ahmed,  |e editor. 
776 0 8 |i Print version:  |t Information fusion for cyber-security analytics.  |d Cham, Switzerland : Springer, [2016]  |z 3319442562  |z 9783319442563  |w (OCoLC)953598332 
830 0 |a Studies in computational intelligence ;  |v v. 691.  |x 1860-949X 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-3-319-44257-0  |y Plný text 
992 |c NTK-SpringerENG 
999 |c 99489  |d 99489 
993 |x NEPOSILAT  |y EIZ