Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1356
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Palomares Carrascosa, Iveen ; | en_US |
dc.contributor.author | Kalutarage, Harsha Kumara ; | en_US |
dc.contributor.author | Huang, Yan ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:02Z | - |
dc.date.available | 2020-05-17T08:28:02Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319594392 ; (electronic bk.) ; | en_US |
dc.identifier.isbn | 3319594397 ; (electronic bk.) ; | en_US |
dc.identifier.isbn | 9783319594385 ; | en_US |
dc.identifier.isbn | 3319594389 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1356 | - |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Print version: ; Palomares Carrascosa, Iveen ; Data Analytics and Decision Support for Cybersecurity : Trends, Methodologies and Applications ; Cham : Springer International Publishing,c2017 ; 9783319594385 ; | en_US |
dc.description.statementofresponsibility | Iveen Palomares Carrascosa, Harsha Kumara Kalutarage, Yan Huang, editors | en_US |
dc.description.tableofcontents | Preface; References; Acknowledgements; Contents; Contributors; Part I Regular Chapters; A Toolset for Intrusion and Insider Threat Detection; 1 Introduction; 2 Coburg Utility Framework; 2.1 Architecture of CUF; 2.2 Filters in CUF; 2.2.1 Input and Output; 2.2.2 Preprocessing; 2.2.3 Clustering; 2.2.4 Classification; 2.2.5 Evaluation; 3 Online Analysis of Network Data Streams; 3.1 General Problem Setting; 3.1.1 Attack Scenarios; 3.1.2 Flow-Based Data; 3.1.3 Data Preparation; 3.1.4 Implications; 3.2 Outline of the Proposed Approach; 3.3 Integration of Domain Knowledge ; | en_US |
dc.description.tableofcontents | 3.4 Service Detection Filter3.5 Network Behaviour Analyser; 3.6 Service Behaviour Analyser; 3.7 User Behaviour Analyser; 4 Data Generation; 4.1 Existing Data Sets; 4.2 Data Set Emulation; 4.2.1 Test Environment; 4.2.2 Generation of Normal Data; 4.2.3 Generation of Malicious Data; 5 Related Work; Category I; Category II; Category III; 6 Summary and Future Work; References; Human-Machine Decision Support Systemsfor Insider Threat Detection; 1 Introduction; 2 Related Works; 2.1 Models for Understanding the Problem of Insider Threat; 2.2 Approaches for Detecting Insider Threat ; | en_US |
dc.description.tableofcontents | 2.3 Insider Threat Visualization2.4 Summary of Related Works; 3 Automated Detection of Insider Threats; 3.1 Automated Detection Using User and Role-Based Profile Assessment; 3.2 Validation of Decision Support in Insider Threat Systems; 4 Visual Analytics of Insider Threat Detection; 4.1 Supporting Human Reasoning using Interactive Visual Analytics; 4.2 Active Learning for Insider Threat Detection; 5 Future Directions for Insider Threat Detection; 6 Summary; References; Detecting Malicious Collusion Between Mobile Software Applications: The AndroidTM Case; 1 Introduction; 1.1 Background ; | en_US |
dc.description.tableofcontents | 4.2.6 Experimental Setup and Validation4.3 Evaluation of Filtering; 4.3.1 Testing the Prolog Filter; 4.3.2 Testing the Probabilistic Filter; 5 Model-Checking for Collusion; 5.1 Software Model Checking; 5.1.1 Challenges; 5.2 The K Framework; 5.3 A Concrete Semantics for Dalvik Code; 5.3.1 System Configurations; 5.3.2 Smali Instructions; 5.3.3 Semantics for the AndroidTM APIs; 5.3.4 Detecting Collusion on the Concrete Semantics Level; 5.4 An Abstract Semantics for Dalvik; 5.4.1 Detecting Collusion on the Abstract Semantics Level; 5.5 Experimental Results; 5.5.1 Evaluation; 6 Related Work ; | en_US |
dc.format.extent | 1 online resource (278 p.) ; | en_US |
dc.format.extent | 6.1 Detecting Malicious Applications ; | en_US |
dc.publisher | Springer International Publishing, | en_US |
dc.relation.ispartofseries | Data Analytics ; | en_US |
dc.relation.ispartofseries | Data Analytics ; | en_US |
dc.relation.haspart | 9783319594392.pdf | en_US |
dc.subject | Computer security ; Decision making ; | en_US |
dc.title | Data analytics and decision support for cybersecurity | en_US |
dc.title.alternative | trends, methodologies and applications / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319594392.pdf | 6.91 MB | Adobe PDF | ![]() Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Palomares Carrascosa, Iveen ; | en_US |
dc.contributor.author | Kalutarage, Harsha Kumara ; | en_US |
dc.contributor.author | Huang, Yan ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:02Z | - |
dc.date.available | 2020-05-17T08:28:02Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319594392 ; (electronic bk.) ; | en_US |
dc.identifier.isbn | 3319594397 ; (electronic bk.) ; | en_US |
dc.identifier.isbn | 9783319594385 ; | en_US |
dc.identifier.isbn | 3319594389 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1356 | - |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Print version: ; Palomares Carrascosa, Iveen ; Data Analytics and Decision Support for Cybersecurity : Trends, Methodologies and Applications ; Cham : Springer International Publishing,c2017 ; 9783319594385 ; | en_US |
dc.description.statementofresponsibility | Iveen Palomares Carrascosa, Harsha Kumara Kalutarage, Yan Huang, editors | en_US |
dc.description.tableofcontents | Preface; References; Acknowledgements; Contents; Contributors; Part I Regular Chapters; A Toolset for Intrusion and Insider Threat Detection; 1 Introduction; 2 Coburg Utility Framework; 2.1 Architecture of CUF; 2.2 Filters in CUF; 2.2.1 Input and Output; 2.2.2 Preprocessing; 2.2.3 Clustering; 2.2.4 Classification; 2.2.5 Evaluation; 3 Online Analysis of Network Data Streams; 3.1 General Problem Setting; 3.1.1 Attack Scenarios; 3.1.2 Flow-Based Data; 3.1.3 Data Preparation; 3.1.4 Implications; 3.2 Outline of the Proposed Approach; 3.3 Integration of Domain Knowledge ; | en_US |
dc.description.tableofcontents | 3.4 Service Detection Filter3.5 Network Behaviour Analyser; 3.6 Service Behaviour Analyser; 3.7 User Behaviour Analyser; 4 Data Generation; 4.1 Existing Data Sets; 4.2 Data Set Emulation; 4.2.1 Test Environment; 4.2.2 Generation of Normal Data; 4.2.3 Generation of Malicious Data; 5 Related Work; Category I; Category II; Category III; 6 Summary and Future Work; References; Human-Machine Decision Support Systemsfor Insider Threat Detection; 1 Introduction; 2 Related Works; 2.1 Models for Understanding the Problem of Insider Threat; 2.2 Approaches for Detecting Insider Threat ; | en_US |
dc.description.tableofcontents | 2.3 Insider Threat Visualization2.4 Summary of Related Works; 3 Automated Detection of Insider Threats; 3.1 Automated Detection Using User and Role-Based Profile Assessment; 3.2 Validation of Decision Support in Insider Threat Systems; 4 Visual Analytics of Insider Threat Detection; 4.1 Supporting Human Reasoning using Interactive Visual Analytics; 4.2 Active Learning for Insider Threat Detection; 5 Future Directions for Insider Threat Detection; 6 Summary; References; Detecting Malicious Collusion Between Mobile Software Applications: The AndroidTM Case; 1 Introduction; 1.1 Background ; | en_US |
dc.description.tableofcontents | 4.2.6 Experimental Setup and Validation4.3 Evaluation of Filtering; 4.3.1 Testing the Prolog Filter; 4.3.2 Testing the Probabilistic Filter; 5 Model-Checking for Collusion; 5.1 Software Model Checking; 5.1.1 Challenges; 5.2 The K Framework; 5.3 A Concrete Semantics for Dalvik Code; 5.3.1 System Configurations; 5.3.2 Smali Instructions; 5.3.3 Semantics for the AndroidTM APIs; 5.3.4 Detecting Collusion on the Concrete Semantics Level; 5.4 An Abstract Semantics for Dalvik; 5.4.1 Detecting Collusion on the Abstract Semantics Level; 5.5 Experimental Results; 5.5.1 Evaluation; 6 Related Work ; | en_US |
dc.format.extent | 1 online resource (278 p.) ; | en_US |
dc.format.extent | 6.1 Detecting Malicious Applications ; | en_US |
dc.publisher | Springer International Publishing, | en_US |
dc.relation.ispartofseries | Data Analytics ; | en_US |
dc.relation.ispartofseries | Data Analytics ; | en_US |
dc.relation.haspart | 9783319594392.pdf | en_US |
dc.subject | Computer security ; Decision making ; | en_US |
dc.title | Data analytics and decision support for cybersecurity | en_US |
dc.title.alternative | trends, methodologies and applications / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319594392.pdf | 6.91 MB | Adobe PDF | ![]() Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Palomares Carrascosa, Iveen ; | en_US |
dc.contributor.author | Kalutarage, Harsha Kumara ; | en_US |
dc.contributor.author | Huang, Yan ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:02Z | - |
dc.date.available | 2020-05-17T08:28:02Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319594392 ; (electronic bk.) ; | en_US |
dc.identifier.isbn | 3319594397 ; (electronic bk.) ; | en_US |
dc.identifier.isbn | 9783319594385 ; | en_US |
dc.identifier.isbn | 3319594389 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1356 | - |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Print version: ; Palomares Carrascosa, Iveen ; Data Analytics and Decision Support for Cybersecurity : Trends, Methodologies and Applications ; Cham : Springer International Publishing,c2017 ; 9783319594385 ; | en_US |
dc.description.statementofresponsibility | Iveen Palomares Carrascosa, Harsha Kumara Kalutarage, Yan Huang, editors | en_US |
dc.description.tableofcontents | Preface; References; Acknowledgements; Contents; Contributors; Part I Regular Chapters; A Toolset for Intrusion and Insider Threat Detection; 1 Introduction; 2 Coburg Utility Framework; 2.1 Architecture of CUF; 2.2 Filters in CUF; 2.2.1 Input and Output; 2.2.2 Preprocessing; 2.2.3 Clustering; 2.2.4 Classification; 2.2.5 Evaluation; 3 Online Analysis of Network Data Streams; 3.1 General Problem Setting; 3.1.1 Attack Scenarios; 3.1.2 Flow-Based Data; 3.1.3 Data Preparation; 3.1.4 Implications; 3.2 Outline of the Proposed Approach; 3.3 Integration of Domain Knowledge ; | en_US |
dc.description.tableofcontents | 3.4 Service Detection Filter3.5 Network Behaviour Analyser; 3.6 Service Behaviour Analyser; 3.7 User Behaviour Analyser; 4 Data Generation; 4.1 Existing Data Sets; 4.2 Data Set Emulation; 4.2.1 Test Environment; 4.2.2 Generation of Normal Data; 4.2.3 Generation of Malicious Data; 5 Related Work; Category I; Category II; Category III; 6 Summary and Future Work; References; Human-Machine Decision Support Systemsfor Insider Threat Detection; 1 Introduction; 2 Related Works; 2.1 Models for Understanding the Problem of Insider Threat; 2.2 Approaches for Detecting Insider Threat ; | en_US |
dc.description.tableofcontents | 2.3 Insider Threat Visualization2.4 Summary of Related Works; 3 Automated Detection of Insider Threats; 3.1 Automated Detection Using User and Role-Based Profile Assessment; 3.2 Validation of Decision Support in Insider Threat Systems; 4 Visual Analytics of Insider Threat Detection; 4.1 Supporting Human Reasoning using Interactive Visual Analytics; 4.2 Active Learning for Insider Threat Detection; 5 Future Directions for Insider Threat Detection; 6 Summary; References; Detecting Malicious Collusion Between Mobile Software Applications: The AndroidTM Case; 1 Introduction; 1.1 Background ; | en_US |
dc.description.tableofcontents | 4.2.6 Experimental Setup and Validation4.3 Evaluation of Filtering; 4.3.1 Testing the Prolog Filter; 4.3.2 Testing the Probabilistic Filter; 5 Model-Checking for Collusion; 5.1 Software Model Checking; 5.1.1 Challenges; 5.2 The K Framework; 5.3 A Concrete Semantics for Dalvik Code; 5.3.1 System Configurations; 5.3.2 Smali Instructions; 5.3.3 Semantics for the AndroidTM APIs; 5.3.4 Detecting Collusion on the Concrete Semantics Level; 5.4 An Abstract Semantics for Dalvik; 5.4.1 Detecting Collusion on the Abstract Semantics Level; 5.5 Experimental Results; 5.5.1 Evaluation; 6 Related Work ; | en_US |
dc.format.extent | 1 online resource (278 p.) ; | en_US |
dc.format.extent | 6.1 Detecting Malicious Applications ; | en_US |
dc.publisher | Springer International Publishing, | en_US |
dc.relation.ispartofseries | Data Analytics ; | en_US |
dc.relation.ispartofseries | Data Analytics ; | en_US |
dc.relation.haspart | 9783319594392.pdf | en_US |
dc.subject | Computer security ; Decision making ; | en_US |
dc.title | Data analytics and decision support for cybersecurity | en_US |
dc.title.alternative | trends, methodologies and applications / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319594392.pdf | 6.91 MB | Adobe PDF | ![]() Preview File |