Sign up
Forgot password?
FAQ: Login

Thuraisingham B., Parveen P., Masud M., Khan L. Big Data Analytics with Applications in Insider Threat Detection

  • pdf file
  • size 74,93 MB
  • added by
  • info modified
Thuraisingham B., Parveen P., Masud M., Khan L. Big Data Analytics with Applications in Insider Threat Detection
Auerbach, 2017. — 579 p. — ISBN10: 1498705472; ISBN13: 978-1498705479.
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.
Dr. Bhavani Thuraisingham is the Louis A. Beecherl, Jr. Distinguished Professor of Computer Science and the Executive Director of the Cyber Security Research and Education Institute (CSI) at the University of Texas at Dallas. Dr. Kevin W. Hamlen is an Assistant Professor in CS at UTD where he directs the Software Security Lab. Dr. Latifur R. Khan is currently an Associate Professor in CS at UTD. Dr. Mehedy Masud is a postdoctoral fellow at UTD where he obtained his Ph.D. in CS in 2009.
  • Sign up or login using form at top of the page to download this file.
  • Sign up
Up