LEADER 04713nam 22006855 450 001 9910254359303321 005 20200630003754.0 010 $a3-319-44257-0 024 7 $a10.1007/978-3-319-44257-0 035 $a(CKB)3710000000926141 035 $a(DE-He213)978-3-319-44257-0 035 $a(MiAaPQ)EBC6295674 035 $a(MiAaPQ)EBC5592397 035 $a(Au-PeEL)EBL5592397 035 $a(OCoLC)961211090 035 $a(PPN)196323614 035 $a(EXLCZ)993710000000926141 100 $a20161021d2017 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Fusion for Cyber-Security Analytics /$fedited by Izzat M Alsmadi, George Karabatis, Ahmed Aleroud 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (X, 379 p. 85 illus., 61 illus. in color.) 225 1 $aStudies in Computational Intelligence,$x1860-949X ;$v691 311 $a3-319-44256-2 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- Part 1: Information Fusion for Cyber-Security Analytics -- Activity Information Fusion for Security Analytics -- Location Information Fusion for Security Analytics -- Time Information Fusion for Security Analytics -- Individuality Information Fusion for Security Analytics -- Relation Information Fusion for Security Analytics -- Part 2: Trends in Using Information Fusion Techniques to Discover Cyber Threats -- Big Data Fusion for Predicting Network Threats -- Using Software Defined Networks for Cyber Threat Discovery -- Privacy Preserving Information Fusion for Analyzing Network Data -- Using Information Fusion to Discover Zero-Day Attacks -- Enhancing Social Network Privacy and Security Using Graph-based Data Fusion -- Using Information Fusion to discover Cyber-threats in Wireless Sensor Networks -- Information Fusion for Improving Privacy and Security in Healthcare Applications -- Predicting Social Engineering Attacks Using Information Fusion Techniques -- Part 3: Applications and tools. -Information Fusion Application and Tools for Cyber Security Analytics -- Conclusion. 330 $aThis book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers. . 410 0$aStudies in Computational Intelligence,$x1860-949X ;$v691 606 $aElectrical engineering 606 $aElectronic circuits 606 $aComputer security 606 $aBig data 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aCircuits and Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/T24068 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aBig Data/Analytics$3https://scigraph.springernature.com/ontologies/product-market-codes/522070 615 0$aElectrical engineering. 615 0$aElectronic circuits. 615 0$aComputer security. 615 0$aBig data. 615 14$aCommunications Engineering, Networks. 615 24$aCircuits and Systems. 615 24$aSystems and Data Security. 615 24$aBig Data/Analytics. 676 $a005.8 702 $aAlsmadi$b Izzat M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKarabatis$b George$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAleroud$b Ahmed$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254359303321 996 $aInformation Fusion for Cyber-Security Analytics$92278500 997 $aUNINA