LEADER 04515nam 22006015 450 001 9910254831503321 005 20200706073528.0 010 $a3-319-59439-7 024 7 $a10.1007/978-3-319-59439-2 035 $a(CKB)3710000001631389 035 $a(MiAaPQ)EBC4933612 035 $a(DE-He213)978-3-319-59439-2 035 $a(PPN)203852834 035 $a(EXLCZ)993710000001631389 100 $a20170801d2017 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aData Analytics and Decision Support for Cybersecurity $eTrends, Methodologies and Applications /$fedited by Iván Palomares Carrascosa, Harsha Kumara Kalutarage, Yan Huang 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (270 pages) $cillustrations (some color), tables 225 1 $aData Analytics,$x2520-1859 311 $a3-319-59438-9 320 $aIncludes bibliographical references at the end of each chapters. 327 $aA Toolset for Intrusion and Insider Threat Detection -- Human-Machine Decision Support Systems for Insider Threat Detection -- Detecting malicious collusions between mobile software applications -- Dynamic Analysis of Malware using Run-Time Opcodes -- Big Data Analytics for Intrusion Detection System: Statistical Decision-making using Finite Dirichlet Mixture Models -- Security of Online Examinations -- Attribute Noise, Classification Technique, and Classification Accuracy -- Learning from Loads: An Intelligent System for Decision Support in Identifying Nodal Load Disturbances of Cyber-Attacks in Smart Power Systems using Gaussian Processes and Fuzzy Inference -- Visualization and Data Provenance Trends in Decision Support for Cybersecurity. 330 $aThe book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks. The recent advent of Big Data paradigms and the use of data science methods, has resulted in a higher demand for effective data-driven models that support decision-making at a strategic level. This motivates the need for defining novel data analytics and decision support approaches in a myriad of real-life scenarios and problems, with Cybersecurity-related domains being no exception. This contributed volume comprises nine chapters, written by leading international researchers, covering a compilation of recent advances in Cybersecurity-related applications of data analytics and decision support approaches. In addition to theoretical studies and overviews of existing relevant literature, this book comprises a selection of application-oriented research contributions. The investigations undertaken across these chapters focus on diverse and critical Cybersecurity problems, such as Intrusion Detection, Insider Threats, Insider Threats, Collusion Detection, Run-Time Malware Detection, Intrusion Detection, E-Learning, Online Examinations, Cybersecurity noisy data removal, Secure Smart Power Systems, Security Visualization and Monitoring. Researchers and professionals alike will find the chapters an essential read for further research on the topic. 410 0$aData Analytics,$x2520-1859 606 $aData mining 606 $aData encryption (Computer science) 606 $aBig data 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aBig Data/Analytics$3https://scigraph.springernature.com/ontologies/product-market-codes/522070 615 0$aData mining. 615 0$aData encryption (Computer science). 615 0$aBig data. 615 14$aData Mining and Knowledge Discovery. 615 24$aCryptology. 615 24$aBig Data/Analytics. 676 $a005.8 702 $aPalomares Carrascosa$b Iván$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKalutarage$b Harsha Kumara$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHuang$b Yan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254831503321 996 $aData Analytics and Decision Support for Cybersecurity$92507967 997 $aUNINA