Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications Front Cover

Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications

  • Length: 270 pages
  • Edition: 1st ed. 2017
  • Publisher:
  • Publication Date: 2017-09-03
  • ISBN-10: 3319594389
  • ISBN-13: 9783319594385
  • Sales Rank: #3893500 (See Top 100 Books)
Description

The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks. The recent advent of Big Data paradigms and the use of data science methods, has resulted in a higher demand for effective data-driven models that support decision-making at a strategic level. This motivates the need for defining novel data analytics and decision support approaches in a myriad of real-life scenarios and problems, with Cybersecurity-related domains being no exception.

This contributed volume comprises nine chapters, written by leading international researchers, covering a compilation of recent advances in Cybersecurity-related applications of data analytics and decision support approaches. In addition to theoretical studies and overviews of existing relevant literature, this book comprises a selection of application-oriented research contributions. The investigations undertaken across these chapters focus on diverse and critical Cybersecurity problems, such as Intrusion Detection, Insider Threats, Insider Threats, Collusion Detection, Run-Time Malware Detection, Intrusion Detection, E-Learning, Online Examinations, Cybersecurity noisy data removal, Secure Smart Power Systems, Security Visualization and Monitoring.

Researchers and professionals alike will find the chapters an essential read for further research on the topic.

Table of Contents

Part I Regular Chapters
Chapter 1 A Toolset For Intrusion And Insider Threat Detection
Chapter 2 Human-Machine Decision Support Systemsfor Insider Threat Detection
Chapter 3 Detecting Malicious Collusion Between Mobile Software Applications: The Androidtm Case
Chapter 4 Dynamic Analysis Of Malware Using Run-Time Opcodes
Chapter 5 Big Data Analytics For Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models
Chapter 6 Security Of Online Examinations
Chapter 7 Attribute Noise, Classification Technique, And Classification Accuracy
Part II Invited Chapters
Chapter 8 Learning From Loads: An Intelligent Systemfor Decision Support In Identifying Nodal Load Disturbances Of Cyber-Attacks In Smart Power Systems Using Gaussian Processes And Fuzzy Inference
Chapter 9 Visualization And Data Provenance Trends In Decision Support For Cybersecurity

To access the link, solve the captcha.