Handbook of Big Data Analytics and Forensics
Venduto da Best Price, Torrance, CA, U.S.A.
Venditore AbeBooks dal 30 agosto 2024
Nuovi - Rilegato
Condizione: Nuovo
Quantità: 2 disponibili
Aggiungere al carrelloVenduto da Best Price, Torrance, CA, U.S.A.
Venditore AbeBooks dal 30 agosto 2024
Condizione: Nuovo
Quantità: 2 disponibili
Aggiungere al carrelloSUPER FAST SHIPPING.
Codice articolo 9783030747527
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, privacy, and forensics literature, focusing on IoT and unmanned aerial vehicles (UAVs). The authors propose a deep learning-based approach to process cloud’s log data and mitigate enumeration attacks in the third chapter. The fourth chapter proposes a robust fuzzy learning model to protect IT-based infrastructure against advanced persistent threat (APT) campaigns. Advanced and fair clustering approach for industrial data, which is capable of training with huge volume of data in a close to linear time is introduced in the fifth chapter, as well as offering an adaptive deep learning model to detect cyberattacks targeting cyber physical systems (CPS) covered in the sixth chapter.
The authors evaluate the performance of unsupervised machine learning for detecting cyberattacks against industrial control systems (ICS) in chapter 7, and the next chapter presents a robust fuzzy Bayesian approach for ICS’s cyber threat hunting. This handbook also evaluates the performance of supervised machine learning methods in identifying cyberattacks against CPS. The performance of a scalable clustering algorithm for CPS’s cyber threat hunting and the usefulness of machine learning algorithms for MacOS malware detection are respectively evaluated.
This handbook continues with evaluating the performance of various machine learning techniques to detect the Internet of Things malware. The authors demonstrate how MacOSX cyberattacks can be detected using state-of-the-art machine learning models. In order to identify credit card frauds, the fifteenth chapter introduces a hybrid model. In the sixteenth chapter, the editors propose a model that leverages natural language processing techniques for generating a mapping between APT-related reports and cyber kill chain. A deep learning-based approach to detect ransomware is introduced, as well as a proposed clustering approach to detect IoT malware in the last two chapters.
This handbook primarily targets professionals and scientists working in Big Data, Digital Forensics, Machine Learning, Cyber Security Cyber Threat Analytics and Cyber Threat Hunting as a reference book. Advanced level-students and researchers studying and working in Computer systems, Computer networks and Artificial intelligence will also find this reference useful.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Visita la pagina della libreria
When you see an item on our listing, it means we have it available in one of our warehouses right here right now, ready for same day or next day processing of your order. Over 50+ Million books in stock & ready to ship same day. Customer Service is a top priority for us, we want every customer to be 100% satisfied. We offer the world's largest selection of books, music and video. Maintaining an accurate inventory of more than 50+ Million items, we are able to ship your order the same day it is r...
SUPER FAST SHIPPING!
Quantità dell?ordine | Da 1 a 3 giorni lavorativi | Da 1 a 3 giorni lavorativi |
---|---|---|
Primo articolo | EUR 7.63 | EUR 16.98 |
I tempi di consegna sono stabiliti dai venditori e variano in base al corriere e al paese. Gli ordini che devono attraversare una dogana possono subire ritardi e spetta agli acquirenti pagare eventuali tariffe o dazi associati. I venditori possono contattarti in merito ad addebiti aggiuntivi dovuti a eventuali maggiorazioni dei costi di spedizione dei tuoi articoli.