Big Data Analytics with Applications in Insider Threat Detection

· CRC Press
Ebook
578
Pages
Eligible
Ratings and reviews aren’t verified  Learn More

About this ebook

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.

About the author

Dr. Bhavani Thuraisingham is the Louis A. Beecherl, Jr. Distinguished Professor of Computer Science and the Executive Director of the Cyber Security Research and Education Institute (CSI) at the University of Texas at Dallas.

Dr. Kevin W. Hamlen is an Assistant Professor in CS at UTD where he directs the Software Security Lab.

Dr. Latifur R. Khan is currently an Associate Professor in CS at UTD.

Dr. Mehedy Masud is an associate professor at the College of Information Technology, United Arab Emirates University.

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.