Amazon cover image
Image from Amazon.com
Syndetics cover image
Image from Syndetics

Big data analytics in cybersecurity and IT management / Onur Savas and Julia Deng

By: Contributor(s): Material type: Computer fileComputer fileLanguage: English Publication details: Boca Raton : CRC Press, 2017Description: 1 online resourceISBN:
  • 9781315154374
Subject(s): DDC classification:
  • 005.800 S266
Online resources:
Contents:
The power of big data in cybersecurity -- Big data analytics for network forensics -- Dynamic analytics-driven assessment of vulnerabilities and exploitation -- Big data analytics for mobile app security -- Machine unlearning: repairing learning models in adversarial -- Environments -- Cybersecurity training -- Machine unlearning: repairing learning models in adversarial environments -- Big data analytics for mobile app security -- Security, privacy and trust in cloud computing: challenges and solutions -- Cybersecurity in internet of things (IOT) -- Data visualization for cyber security -- Analyzing deviant socio-technical behaviors using social network analysis and cyber forensics-based methodologies -- Security tools -- Data and research initiatives for cybersecurity analysis
List(s) this item appears in: Computer Science
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

The power of big data in cybersecurity -- Big data analytics for network forensics -- Dynamic analytics-driven assessment of vulnerabilities and exploitation -- Big data analytics for mobile app security -- Machine unlearning: repairing learning models in adversarial -- Environments -- Cybersecurity training -- Machine unlearning: repairing learning models in adversarial environments -- Big data analytics for mobile app security -- Security, privacy and trust in cloud computing: challenges and solutions -- Cybersecurity in internet of things (IOT) -- Data visualization for cyber security -- Analyzing deviant socio-technical behaviors using social network analysis and cyber forensics-based methodologies -- Security tools -- Data and research initiatives for cybersecurity analysis

There are no comments on this title.

to post a comment.
Share
This system is made operational by the in-house staff of the CUP Library.