000 | 02577nam a2200349 i 4500 | ||
---|---|---|---|
001 | CR9781108231954 | ||
003 | UkCbUP | ||
005 | 20240906164935.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr|||||||||||| | ||
008 | 161123s2022||||enk o ||1 0|eng|d | ||
020 | _a9781108231954 (ebook) | ||
020 | _z9781108415279 (hardback) | ||
040 |
_aUkCbUP _beng _erda _cUkCbUP |
||
050 | 0 | 0 |
_aQA76.9.A25 _bJ37 2022 |
082 | 0 | 0 |
_a005.8 _223/eng/20211122 |
100 | 1 |
_aJaneja, Vandana P., _d1976- _eauthor. |
|
245 | 1 | 0 |
_aData analytics for cybersecurity / _cVandana P. Janeja. |
264 | 1 |
_aCambridge ; New York, NY : _bCambridge University Press, _c2022. |
|
300 |
_a1 online resource (xiii, 192 pages) : _bdigital, PDF file(s). |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
500 | _aTitle from publisher's bibliographic system (viewed on 10 Aug 2022). | ||
505 | 0 | _aIntroduction - data analytics for cybersecurity -- Understanding sources of cybersecurity data -- Introduction to data mining : clustering, classification and association rule mining -- Big data analytics and its need for cybersecurity -- Types of cyber attacks -- Anomaly detection for cyber security -- Anomaly detection -- Cybersecurity through time series and spatial data -- Cybersecurity through network and graph data -- Human centered data analytics for cyber security -- Future directions in data analytics for cybersecurity. | |
520 | _aAs the world becomes increasingly connected, it is also more exposed to a myriad of cyber threats. We need to use multiple types of tools and techniques to learn and understand the evolving threat landscape. Data is a common thread linking various types of devices and end users. Analyzing data across different segments of cybersecurity domains, particularly data generated during cyber-attacks, can help us understand threats better, prevent future cyber-attacks, and provide insights into the evolving cyber threat landscape. This book takes a data oriented approach to studying cyber threats, showing in depth how traditional methods such as anomaly detection can be extended using data analytics and also applies data analytics to non-traditional views of cybersecurity, such as multi domain analysis, time series and spatial data analysis, and human-centered cybersecurity. | ||
650 | 0 |
_aComputer security _xData processing. |
|
650 | 0 | _aData mining. | |
776 | 0 | 8 |
_iPrint version: _z9781108415279 |
856 | 4 | 0 | _uhttps://doi.org/10.1017/9781108231954 |
942 |
_2ddc _cEB |
||
999 |
_c8968 _d8968 |