Big data analytics with applications in insider threat detection / Pallabi Parveen [and three others]
Material type: Computer fileLanguage: English Publication details: Boca Raton : Taylor & Francis, CRC Press, [2018];©2018Description: 1 online resource (xvii, 269 pages)ISBN:- 9781315119458
- 005.800 P276
Item type | Current library | Call number | URL | Status | Barcode | |
---|---|---|---|---|---|---|
E-Book | Ranganathan Library | 005.800 P276 (Browse shelf(Opens below)) | Link to resource | Available | E01490 |
Browsing Ranganathan Library shelves Close shelf browser (Hides shelf browser)
chapter 1 Introduction -- part PART I Supporting Technologies for BDMA and BDSP -- chapter Introduction to Part I -- chapter 2 Data Security and Privacy -- chapter 3 Data Mining Techniques -- chapter 4 Data Mining for Security Applications -- chapter 5 Cloud Computing and Semantic Web Technologies -- chapter 6 Data Mining and Insider Threat Detection -- chapter 7 Big Data Management and Analytics Technologies -- chapter Conclusion to Part I -- part PART II Stream Data Analytics -- chapter Introduction to Part II -- chapter 8 Challenges for Stream Data Classification -- chapter 9 Survey of Stream Data Classification -- chapter 10 A Multi-Partition, Multi-Chunk Ensemble for Classifying Concept-Drifting Data Streams -- chapter 11 Classification and Novel Class Detection in Concept-Drifting Data Streams -- chapter 12 Data Stream Classification with Limited Labeled Training Data -- chapter 13 Directions in Data Stream Classification -- chapter Conclusion to Part II -- part PART III Stream Data Analytics for Insider Threat Detection -- chapter Introduction to Part III -- chapter 14 Insider Threat Detection as a Stream Mining Problem -- chapter 15 Survey of Insider Threat and Stream Mining -- chapter 16 Ensemble-Based Insider Threat Detection -- chapter 17 Details of Learning Classes -- chapter 18 Experiments and Results for Nonsequence Data -- chapter 19 Insider Threat Detection for Sequence Data -- chapter 20 Experiments and Results for Sequence Data -- chapter 21 Scalability Using Big Data Technologies -- chapter 22 Stream Mining and Big Data for Insider Threat Detection -- chapter Conclusion to Part III -- part PART IV Experimental BDMA and BDSP Systems -- chapter Introduction to Part IV -- chapter 23 Cloud Query Processing System for Big Data Management -- chapter 24 Big Data Analytics for Multipurpose Social Media Applications -- chapter 25 Big Data Management and Cloud for Assured Information Sharing -- chapter 26 Big Data Management for Secure Information Integration -- chapter 27 Big Data Analytics for Malware Detection -- chapter 28 A Semantic Web-Based Inference Controller for Provenance Big Data -- part PART V Next Steps for BDMA and BDSP -- chapter Introduction to Part V -- chapter 29 Confidentiality, Privacy, and Trust for Big Data Systems -- chapter 30 Unified Framework for Secure Big Data Management and Analytics -- chapter 31 Big Data, Security, and the Internet of Things -- chapter 32 Big Data Analytics for Malware Detection in Smartphones -- chapter 33 Toward a Case Study in Healthcare for Big Data Analytics and Security -- chapter 34 Toward an Experimental Infrastructure and Education Program for BDMA and BDSP -- chapter 35 Directions for BDSP and BDMA -- chapter Conclusion to Part V -- chapter 36 Summary and Directions
There are no comments on this title.