Data Warehousing and Data Mining Techniques for Cyber Security [Singhal 2006-12-13].pdf
(
7621 KB
)
Pobierz
Data Warehousing and
Data Mining Techniques for
Cyber Security
Advances in Information Security
Sushil Jajodia
Consulting Editor
Center for Secure Information Systems
George Mason University
Fairfax, VA 22030-4444
email: jajodia @smu. edu
The goals of the Springer International Series on ADVANCES IN INFORMATION
SECURITY are, one, to establish the state of the art of, and set the course for future research
in information security and, two, to serve as a central reference source for advanced and
timely topics in information security research and development. The scope of this series
includes all aspects of computer and network security and related areas such as fault tolerance
and software assurance.
ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive
overviews of specific topics in information security, as well as works that are larger in scope
or that contain more detailed background information than can be accommodated in shorter
survey articles. The series also serves as a forum for topics that may not have reached a level
of maturity to warrant a comprehensive textbook treatment.
Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with
ideas for books under this series.
Additional titles in the series:
SECURE LOCALIZATION AND TIME SYNCHRONIZATION FOR WIRELESS
SENSOR AND AD HOC NETWORKS
edited by Radha Poovendran, Cliff Wang, and Sumit
Roy; ISBN: 0-387-32721-5
PRESERVING PRIVACY IN ON-LINE ANALYTICAL PROCESSING (OLAP)
by Lingyu
Wang, Sushil Jajodia and Duminda Wijesekera; ISBN: 978-0-387-46273-8
SECURITY FOR WIRELESS SENSOR NETWORKS
by Donggang Liu and Peng Ning;
ISBN: 978-0-387-32723-5
MALWARE DETECTION
edited by Somesh Jha, Cliff Wang, Mihai Christodorescu, Dawn
Song, and Douglas Maughan; ISBN: 978-0-387-32720-4
ELECTRONIC POSTAGE SYSTEMS: Technology, Security, Economics
by Gerrit
Bleumer; ISBN: 978-0-387-29313-2
MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS
by Jintai Ding, Jason E. Gower and
Dieter Schmidt; ISBN-13: 978-0-378-32229-2
UNDERSTANDING INTRUSION DETECTION THROUGH VISUALIZATION
by
Stefan Axelsson; ISBN-10: 0-387-27634-3
QUALITY OF PROTECTION: Security Measurements and Metrics
by Dieter Gollmann,
Fabio Massacci and Artsiom Yautsiukhin; ISBN-10: 0-387-29016-8
COMPUTER VIRUSES AND MALWARE
by John Aycock; ISBN-10: 0-387-30236-0
HOP INTEGRITY IN THE INTERNET
by Chin-Tser Huang and Mohamed G. Gouda;
ISBN-10: 0-387-22426-3
CRYPTOGRAPHICS: Exploiting Graphics Cards For Security
by Debra Cook and
Angelos Keromytis; ISBN: 0-387-34189-7
Additional information about this series can M obtained from
http://www.springer.com
Data Warehousing and
Data Mining Techniques for
Cyber Security
by
Anoop Singhal
NIST, Computer Security Division
USA
Springer
Anoop Singhal
NIST, Computer Security Division
National Institute of Standards and Tech
Gaithersburg MD 20899
psinghal@nist.gov
Library of Congress Control Number: 2006934579
Data Warehousing and Data Mining Techniques for Cyber Security
by Anoop Singhal
ISBN-10: 0-387-26409-4
ISBN-13: 978-0-387-26409-7
e-ISBN-10: 0-387-47653-9
e-ISBN-13: 978-0-387-47653-7
Printed on acid-free paper.
©
2007 Springer Science+Business Media, LLC
All rights reserved. This work may not be translated or copied in whole or
in part without the written permission of the publisher (Springer
Science+Business Media, LLC, 233 Spring Street, New York, NY 10013,
USA), except for brief excerpts in connection with reviews or scholarly
analysis. Use in connection with any form of information storage and
retrieval, electronic adaptation, computer software, or by similar or
dissimilar methodology now know or hereafter developed is forbidden.
The use in this publication of trade names, trademarks, service marks and
similar terms, even if the are not identified as such, is not to be taken as
an expression of opinion as to whether or not they are subject to
proprietary rights.
Printed in the United States of America.
9 8 7 6 5 4 3 2 1
springer.com
Plik z chomika:
musli_com
Inne pliki z tego folderu:
21 Recipes for Mining Twitter_ Distilling Rich Information from Messy Data [Russell 2011-03-10](1).pdf
(1049 KB)
Active Mining_ New Directions of Data Mining [Motoda 2002-07-29](2).pdf
(8618 KB)
Advanced Data Mining Techniques [Olson & Delen 2008-01-21](1).pdf
(1098 KB)
Advances in Data Mining_ Knowledge Discovery and Applications [Karahoca 2014](2).pdf
(15624 KB)
Advances in K-means Clustering_ A Data Mining Thinking [Wu 2012-07-10](1).pdf
(2511 KB)
Inne foldery tego chomika:
cheat-sheets
Data Structures
Demystified Series
Dreamweaver
Eclipse
Zgłoś jeśli
naruszono regulamin