Data Science in Cybersecurity and Cyberthreat Intelligence



de

,

Éditeur :

Springer


Paru le : 2020-02-05



eBook Téléchargement , DRM LCP 🛈 DRM Adobe 🛈
Lecture en ligne (streaming)
200,44

Téléchargement immédiat
Dès validation de votre commande
Ajouter à ma liste d'envies
Image Louise Reader présentation

Louise Reader

Lisez ce titre sur l'application Louise Reader.

Description


Ce livre présente un ensemble d'approches de pointe pour utiliser l'apprentissage machine, les bases de connaissances formelles et les ensembles de règles, ainsi que le raisonnement sémantique pour détecter les attaques sur les réseaux de communication, y compris les infrastructures IdO, pour automatiser la détection des codes malveillants, pour prévoir efficacement les cyberattaques dans les entreprises, pour identifier les URL malveillantes et les noms de domaine générés par la DGA, et pour améliorer la sécurité des produits portables mHealth. Ce livre explique en détail comment l'analyse de la probabilité d'exploitation des vulnérabilités à l'aide de classificateurs d'apprentissage machine peut offrir une alternative aux solutions traditionnelles de tests de pénétration. En outre, le livre décrit une série de techniques qui permettent l'agrégation et la fusion de données afin d'automatiser l'analyse des données dans le domaine du renseignement sur les cybermenaces, ce qui permet d'identifier et de classer des cybermenaces complexes et inconnues jusqu'alors, et d'intégrer des contre-mesures dans de nouveaux mécanismes de réponse aux incidents et de détection des intrusions.

Pages
129 pages
Collection
n.c
Parution
2020-02-05
Marque
Springer
EAN papier
9783030387877
EAN PDF
9783030387884

Informations sur l'ebook
Nombre pages copiables
1
Nombre pages imprimables
12
Taille du fichier
5919 Ko
Prix
200,44 €
EAN EPUB
9783030387884

Informations sur l'ebook
Nombre pages copiables
1
Nombre pages imprimables
12
Taille du fichier
7660 Ko
Prix
200,44 €

Dr. Leslie F. Sikos is a computer scientist specializing in network forensics and cybersecurity applications powered by artificial intelligence and data science. He has worked in both academia and the industry and acquired hands-on skills in datacenter and cloud infrastructures, cyberthreat management, and firewall configuration. He regularly contributes to major cybersecurity projects in collaboration with the Defence Science and Technology Group of the Australian Government, CSIRO’s Data61, and the CyberCRC. He is a reviewer of journals such as Computers & Security and Crime Science and chairs sessions at international conferences on AI in cybersecurity. Dr. Sikos holds professional certificates and is a member of industry-leading organizations, such as the ACM, the IEEE Special Interest Group on Big Data for Cyber Security and Privacy, and the IEEE Computer Society Technical Committee on Security and Privacy. 

Prof. Kim-Kwang Raymond Choo received a Ph.D. in Information Security in 2006 from the Queensland University of Technology, Australia. He currently holds a Cloud Technology Endowed Professorship at The University of Texas at San Antonio, USA, and has a courtesy appointment at the University of South Australia, Australia. He serves on the editorial board of Computers & Electrical Engineering, Computers & Security, Cluster Computing, Digital Investigation, IEEE Access, IEEE Blockchain Newsletter, IEEE Cloud Computing, IEEE Communications Magazine, IEEE Transactions on Big Data, Future Generation Computer Systems, Journal of Network and Computer Applications, PLoS ONE, Soft Computing, etc. He also serves as the Special Issue Guest Editor of ACM Transactions on Embedded Computing Systems (2017), ACM Transactions on Internet Technology (2016), Applied Soft Computing (2018), Computers & Electrical Engineering (2017), Computers & Security (2018), Digital Investigation (2016), Future Generation Computer Systems (2016, 2018), IEEE Access (2017, 2018), IEEE Cloud Computing (2015), IEEE Communications Magazine (2018), IEEE Network (2016), IEEE Transactions on Cloud Computing (2017), IEEE Transactions on Dependable and Secure Computing (2017), IEEE Transactions on Industrial Informatics (2018), Journal of Computational Science (2018), Journal of Computer and System Sciences (2017), Multimedia Tools and Applications (2017), Personal and Ubiquitous Computing (2017), Pervasive and Mobile Computing (2016), Wireless Personal Communications (2017), etc. In 2016, he was named the Cybersecurity Educator of the Year – APAC (Cybersecurity Excellence Awards are produced in cooperation with the Information Security Community on LinkedIn), and in 2015, he and his team won the Digital Forensics Research Challenge organized by the University of Erlangen-Nuremberg, Germany. He is the recipient of the 2018 UTSA College of Business Col. Jean Piccione and Lt. Col. Philip Piccione Endowed Research Award for Tenured Faculty, IEEE TrustCom 2018 Best Paper Award, ESORICS 2015 Best Research Paper Award, 2014 Highly Commended Award by the Australia New Zealand Policing Advisory Agency, Fulbright Scholarship in 2009, 2008 Australia Day Achievement Medallion, and British Computer Society’s Wilkes Award in 2008. He is also a Fellow of the Australian Computer Society and an IEEE Senior Member.

   ?

Suggestions personnalisées