0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (8)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 13 of 13 matches in All Departments

Secure Data Science - Integrating Cyber Security and Data Science (Hardcover): Murat Kantarcioglu, Latifur Khan, Bhavani... Secure Data Science - Integrating Cyber Security and Data Science (Hardcover)
Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham
R3,512 Discovery Miles 35 120 Ships in 9 - 15 working days

Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques being developed have applications in solving such cyber security problems as intrusion detection, malware analysis, and insider threat detection. However, the data science techniques being applied not only for cyber security but also for every application area-including healthcare, finance, manufacturing, and marketing-could be attacked by malware. Furthermore, due to the power of data science, it is now possible to infer highly private and sensitive information from public data, which could result in the violation of individual privacy. This is the first such book that provides a comprehensive overview of integrating both cyber security and data science and discusses both theory and practice in secure data science. After an overview of security and privacy for big data services as well as cloud computing, this book describes applications of data science for cyber security applications. It also discusses such applications of data science as malware analysis and insider threat detection. Then this book addresses trends in adversarial machine learning and provides solutions to the attacks on the data science techniques. In particular, it discusses some emerging trends in carrying out trustworthy analytics so that the analytics techniques can be secured against malicious attacks. Then it focuses on the privacy threats due to the collection of massive amounts of data and potential solutions. Following a discussion on the integration of services computing, including cloud-based services for secure data science, it looks at applications of secure data science to information sharing and social media. This book is a useful resource for researchers, software developers, educators, and managers who want to understand both the high level concepts and the technical details on the design and implementation of secure data science-based systems. It can also be used as a reference book for a graduate course in secure data science. Furthermore, this book provides numerous references that would be helpful for the reader to get more details about secure data science.

Design and Implementation of Data Mining Tools (Paperback): Bhavani Thuraisingham, Latifur Khan, Mamoun Awad, Lei Wang Design and Implementation of Data Mining Tools (Paperback)
Bhavani Thuraisingham, Latifur Khan, Mamoun Awad, Lei Wang
R1,805 Discovery Miles 18 050 Ships in 12 - 17 working days

Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors' own research work, the book takes a practical approach to the subject. The first part of the book reviews data mining techniques, such as artificial neural networks and support vector machines, as well as data mining applications. The second section covers the design and implementation of data mining tools for intrusion detection. It examines various designs and performance results, along with the strengths and weaknesses of the approaches. The third part presents techniques to solve the WWW prediction problem. The final part describes models that the authors have developed for image classification. Showing step by step how data mining tools are developed, this hands-on guide discusses the performance results, limitations, and unique contributions of data mining systems. It provides essential information for technologists to decide on the tools to select for a particular application, for developers to focus on alternative designs if an approach is unsuitable, and for managers to choose whether to proceed with a data mining project.

Big Data Analytics with Applications in Insider Threat Detection (Paperback): Bhavani Thuraisingham, Pallabi Parveen, Mohammad... Big Data Analytics with Applications in Insider Threat Detection (Paperback)
Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan
R1,432 Discovery Miles 14 320 Ships in 12 - 17 working days

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.

Analyzing and Securing Social Networks (Paperback): Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu,... Analyzing and Securing Social Networks (Paperback)
Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, …
R1,436 Discovery Miles 14 360 Ships in 12 - 17 working days

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.

Data Mining Tools for Malware Detection (Hardcover): Mehedy Masud, Latifur Khan, Bhavani Thuraisingham Data Mining Tools for Malware Detection (Hardcover)
Mehedy Masud, Latifur Khan, Bhavani Thuraisingham
R3,728 Discovery Miles 37 280 Ships in 12 - 17 working days

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets.

The authors describe the systems they have designed and developed: email worm detection using data mining, a scalable multi-level feature extraction technique to detect malicious executables, detecting remote exploits using data mining, and flow-based identification of botnet traffic by mining multiple log files. For each of these tools, they detail the system architecture, algorithms, performance results, and limitations.

  • Discusses data mining for emerging applications, including adaptable malware detection, insider threat detection, firewall policy analysis, and real-time data mining
  • Includes four appendices that provide a firm foundation in data management, secure systems, and the semantic web
  • Describes the authors tools for stream data mining

From algorithms to experimental results, this is one of the few books that will be equally valuable to those in industry, government, and academia. It will help technologists decide which tools to select for specific applications, managers will learn how to determine whether or not to proceed with a data mining project, and developers will find innovative alternative designs for a range of applications.

Design and Implementation of Data Mining Tools (Hardcover): Bhavani Thuraisingham, Latifur Khan, Mamoun Awad, Lei Wang Design and Implementation of Data Mining Tools (Hardcover)
Bhavani Thuraisingham, Latifur Khan, Mamoun Awad, Lei Wang
R2,949 Discovery Miles 29 490 Ships in 12 - 17 working days

Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors' own research work, the book takes a practical approach to the subject. The first part of the book reviews data mining techniques, such as artificial neural networks and support vector machines, as well as data mining applications. The second section covers the design and implementation of data mining tools for intrusion detection. It examines various designs and performance results, along with the strengths and weaknesses of the approaches. The third part presents techniques to solve the WWW prediction problem. The final part describes models that the authors have developed for image classification. Showing step by step how data mining tools are developed, this hands-on guide discusses the performance results, limitations, and unique contributions of data mining systems. It provides essential information for technologists to decide on the tools to select for a particular application, for developers to focus on alternative designs if an approach is unsuitable, and for managers to choose whether to proceed with a data mining project.

Big Data Analytics with Applications in Insider Threat Detection (Hardcover): Bhavani Thuraisingham, Pallabi Parveen, Mohammad... Big Data Analytics with Applications in Insider Threat Detection (Hardcover)
Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan
R3,146 Discovery Miles 31 460 Ships in 12 - 17 working days

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.

Multimedia Data Mining and Knowledge Discovery (Paperback, 2007 ed.): Valery A. Petrushin, Latifur Khan Multimedia Data Mining and Knowledge Discovery (Paperback, 2007 ed.)
Valery A. Petrushin, Latifur Khan
R5,329 Discovery Miles 53 290 Ships in 10 - 15 working days

This volume provides an overview of multimedia data mining and knowledge discovery and discusses the variety of hot topics in multimedia data mining research. It describes the objectives and current tendencies in multimedia data mining research and their applications. Each part contains an overview of its chapters and leads the reader with a structured approach through the diverse subjects in the field.

Multimedia Data Mining and Knowledge Discovery (Hardcover, 2007 ed.): Valery A. Petrushin, Latifur Khan Multimedia Data Mining and Knowledge Discovery (Hardcover, 2007 ed.)
Valery A. Petrushin, Latifur Khan
R5,409 Discovery Miles 54 090 Ships in 10 - 15 working days

This volume provides an overview of multimedia data mining and knowledge discovery and discusses the variety of hot topics in multimedia data mining research. It describes the objectives and current tendencies in multimedia data mining research and their applications. Each part contains an overview of its chapters and leads the reader with a structured approach through the diverse subjects in the field.

Big Data - BigData 2018 - 7th International Congress, Held as Part of the Services Conference Federation, SCF 2018, Seattle,... Big Data - BigData 2018 - 7th International Congress, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings (Paperback, 1st ed. 2018)
Francis Y L Chin, C.L. Philip Chen, Latifur Khan, Kisung Lee, Liang-Jie Zhang
R2,727 Discovery Miles 27 270 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 7th International Conference on BIGDATA 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 22 full papers together with 10 short papers published in this volume were carefully reviewed and selected from 97 submissions. They are organized in topical sections such as Data analysis, data as a service, services computing, data conversion, data storage, data centers, dataflow architectures, data compression, data exchange, data modeling, databases, and data management.

Advances in Knowledge Discovery and Data Mining - 20th Pacific-Asia Conference, PAKDD 2016, Auckland, New Zealand, April 19-22,... Advances in Knowledge Discovery and Data Mining - 20th Pacific-Asia Conference, PAKDD 2016, Auckland, New Zealand, April 19-22, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
James Bailey, Latifur Khan, Takashi Washio, Gill Dobbie, Joshua Zhexue Huang, …
R3,458 Discovery Miles 34 580 Ships in 10 - 15 working days

This two-volume set, LNAI 9651 and 9652, constitutes the thoroughly refereed proceedings of the 20th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2016, held in Auckland, New Zealand, in April 2016. The 91 full papers were carefully reviewed and selected from 307 submissions. They are organized in topical sections named: classification; machine learning; applications; novel methods and algorithms; opinion mining and sentiment analysis; clustering; feature extraction and pattern mining; graph and network data; spatiotemporal and image data; anomaly detection and clustering; novel models and algorithms; and text mining and recommender systems.

Advances in Knowledge Discovery and Data Mining - 20th Pacific-Asia Conference, PAKDD 2016, Auckland, New Zealand, April 19-22,... Advances in Knowledge Discovery and Data Mining - 20th Pacific-Asia Conference, PAKDD 2016, Auckland, New Zealand, April 19-22, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
James Bailey, Latifur Khan, Takashi Washio, Gill Dobbie, Joshua Zhexue Huang, …
R3,347 Discovery Miles 33 470 Ships in 10 - 15 working days

This two-volume set, LNAI 9651 and 9652, constitutes the thoroughly refereed proceedings of the 20th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2016, held in Auckland, New Zealand, in April 2016. The 91 full papers were carefully reviewed and selected from 307 submissions. They are organized in topical sections named: classification; machine learning; applications; novel methods and algorithms; opinion mining and sentiment analysis; clustering; feature extraction and pattern mining; graph and network data; spatiotemporal and image data; anomaly detection and clustering; novel models and algorithms; and text mining and recommender systems.

Analyzing and Securing Social Networks (Hardcover): Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu,... Analyzing and Securing Social Networks (Hardcover)
Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, …
R3,753 Discovery Miles 37 530 Ships in 12 - 17 working days

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cadac 47cm Paella Pan
R1,158 Discovery Miles 11 580
Shield Fresh 24 Mist Spray (Vanilla…
R19 Discovery Miles 190
Comfort Food From Your Slow Cooker - 100…
Sarah Flower Paperback R550 R455 Discovery Miles 4 550
An Introduction To Scholarship…
Cheryl Siewierski Paperback  (2)
R360 Discovery Miles 3 600
Complete Maintenance Dog Food - Large to…
R250 R237 Discovery Miles 2 370
Efekto Karbaspray - Wettable Powder…
R99 R39 Discovery Miles 390
Jurassic Park Trilogy Collection
Sam Neill, Laura Dern, … Blu-ray disc  (1)
R311 Discovery Miles 3 110
Pet Mall Pet Bed Rectangle Fur 100cm X…
R2,822 Discovery Miles 28 220
Conforming Bandage
R5 Discovery Miles 50
Wish
Blu-ray disc R763 R557 Discovery Miles 5 570

 

Partners