0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (10)
  • -
Status
Brand

Showing 1 - 13 of 13 matches in All Departments

Secure Data Science - Integrating Cyber Security and Data Science (Hardcover): Murat Kantarcioglu, Latifur Khan, Bhavani... Secure Data Science - Integrating Cyber Security and Data Science (Hardcover)
Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham
R3,377 Discovery Miles 33 770 Ships in 9 - 15 working days

Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques being developed have applications in solving such cyber security problems as intrusion detection, malware analysis, and insider threat detection. However, the data science techniques being applied not only for cyber security but also for every application area-including healthcare, finance, manufacturing, and marketing-could be attacked by malware. Furthermore, due to the power of data science, it is now possible to infer highly private and sensitive information from public data, which could result in the violation of individual privacy. This is the first such book that provides a comprehensive overview of integrating both cyber security and data science and discusses both theory and practice in secure data science. After an overview of security and privacy for big data services as well as cloud computing, this book describes applications of data science for cyber security applications. It also discusses such applications of data science as malware analysis and insider threat detection. Then this book addresses trends in adversarial machine learning and provides solutions to the attacks on the data science techniques. In particular, it discusses some emerging trends in carrying out trustworthy analytics so that the analytics techniques can be secured against malicious attacks. Then it focuses on the privacy threats due to the collection of massive amounts of data and potential solutions. Following a discussion on the integration of services computing, including cloud-based services for secure data science, it looks at applications of secure data science to information sharing and social media. This book is a useful resource for researchers, software developers, educators, and managers who want to understand both the high level concepts and the technical details on the design and implementation of secure data science-based systems. It can also be used as a reference book for a graduate course in secure data science. Furthermore, this book provides numerous references that would be helpful for the reader to get more details about secure data science.

Multimedia Data Mining and Knowledge Discovery (Hardcover, 2007 ed.): Valery A. Petrushin, Latifur Khan Multimedia Data Mining and Knowledge Discovery (Hardcover, 2007 ed.)
Valery A. Petrushin, Latifur Khan
R4,225 Discovery Miles 42 250 Ships in 12 - 17 working days

This volume provides an overview of multimedia data mining and knowledge discovery and discusses the variety of hot topics in multimedia data mining research. It describes the objectives and current tendencies in multimedia data mining research and their applications. Each part contains an overview of its chapters and leads the reader with a structured approach through the diverse subjects in the field.

Design and Implementation of Data Mining Tools (Paperback): Bhavani Thuraisingham, Latifur Khan, Mamoun Awad, Lei Wang Design and Implementation of Data Mining Tools (Paperback)
Bhavani Thuraisingham, Latifur Khan, Mamoun Awad, Lei Wang
R1,737 Discovery Miles 17 370 Ships in 12 - 17 working days

Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors' own research work, the book takes a practical approach to the subject. The first part of the book reviews data mining techniques, such as artificial neural networks and support vector machines, as well as data mining applications. The second section covers the design and implementation of data mining tools for intrusion detection. It examines various designs and performance results, along with the strengths and weaknesses of the approaches. The third part presents techniques to solve the WWW prediction problem. The final part describes models that the authors have developed for image classification. Showing step by step how data mining tools are developed, this hands-on guide discusses the performance results, limitations, and unique contributions of data mining systems. It provides essential information for technologists to decide on the tools to select for a particular application, for developers to focus on alternative designs if an approach is unsuitable, and for managers to choose whether to proceed with a data mining project.

Analyzing and Securing Social Networks (Paperback): Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu,... Analyzing and Securing Social Networks (Paperback)
Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, …
R1,382 Discovery Miles 13 820 Ships in 12 - 17 working days

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.

Data Mining Tools for Malware Detection (Hardcover): Mehedy Masud, Latifur Khan, Bhavani Thuraisingham Data Mining Tools for Malware Detection (Hardcover)
Mehedy Masud, Latifur Khan, Bhavani Thuraisingham
R3,584 Discovery Miles 35 840 Ships in 12 - 17 working days

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets.

The authors describe the systems they have designed and developed: email worm detection using data mining, a scalable multi-level feature extraction technique to detect malicious executables, detecting remote exploits using data mining, and flow-based identification of botnet traffic by mining multiple log files. For each of these tools, they detail the system architecture, algorithms, performance results, and limitations.

  • Discusses data mining for emerging applications, including adaptable malware detection, insider threat detection, firewall policy analysis, and real-time data mining
  • Includes four appendices that provide a firm foundation in data management, secure systems, and the semantic web
  • Describes the authors tools for stream data mining

From algorithms to experimental results, this is one of the few books that will be equally valuable to those in industry, government, and academia. It will help technologists decide which tools to select for specific applications, managers will learn how to determine whether or not to proceed with a data mining project, and developers will find innovative alternative designs for a range of applications.

Big Data Analytics with Applications in Insider Threat Detection (Paperback): Bhavani Thuraisingham, Pallabi Parveen, Mohammad... Big Data Analytics with Applications in Insider Threat Detection (Paperback)
Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan
R1,378 Discovery Miles 13 780 Ships in 12 - 17 working days

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.

Design and Implementation of Data Mining Tools (Hardcover): Bhavani Thuraisingham, Latifur Khan, Mamoun Awad, Lei Wang Design and Implementation of Data Mining Tools (Hardcover)
Bhavani Thuraisingham, Latifur Khan, Mamoun Awad, Lei Wang
R2,836 Discovery Miles 28 360 Ships in 12 - 17 working days

Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors' own research work, the book takes a practical approach to the subject. The first part of the book reviews data mining techniques, such as artificial neural networks and support vector machines, as well as data mining applications. The second section covers the design and implementation of data mining tools for intrusion detection. It examines various designs and performance results, along with the strengths and weaknesses of the approaches. The third part presents techniques to solve the WWW prediction problem. The final part describes models that the authors have developed for image classification. Showing step by step how data mining tools are developed, this hands-on guide discusses the performance results, limitations, and unique contributions of data mining systems. It provides essential information for technologists to decide on the tools to select for a particular application, for developers to focus on alternative designs if an approach is unsuitable, and for managers to choose whether to proceed with a data mining project.

Multimedia Data Mining and Knowledge Discovery (Paperback, 2007 ed.): Valery A. Petrushin, Latifur Khan Multimedia Data Mining and Knowledge Discovery (Paperback, 2007 ed.)
Valery A. Petrushin, Latifur Khan
R5,022 Discovery Miles 50 220 Ships in 10 - 15 working days

This volume provides an overview of multimedia data mining and knowledge discovery and discusses the variety of hot topics in multimedia data mining research. It describes the objectives and current tendencies in multimedia data mining research and their applications. Each part contains an overview of its chapters and leads the reader with a structured approach through the diverse subjects in the field.

Big Data Analytics with Applications in Insider Threat Detection (Hardcover): Bhavani Thuraisingham, Pallabi Parveen, Mohammad... Big Data Analytics with Applications in Insider Threat Detection (Hardcover)
Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan
R3,025 Discovery Miles 30 250 Ships in 12 - 17 working days

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.

Big Data - BigData 2018 - 7th International Congress, Held as Part of the Services Conference Federation, SCF 2018, Seattle,... Big Data - BigData 2018 - 7th International Congress, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings (Paperback, 1st ed. 2018)
Francis Y L Chin, C.L. Philip Chen, Latifur Khan, Kisung Lee, Liang-Jie Zhang
R2,554 Discovery Miles 25 540 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 7th International Conference on BIGDATA 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 22 full papers together with 10 short papers published in this volume were carefully reviewed and selected from 97 submissions. They are organized in topical sections such as Data analysis, data as a service, services computing, data conversion, data storage, data centers, dataflow architectures, data compression, data exchange, data modeling, databases, and data management.

Advances in Knowledge Discovery and Data Mining - 20th Pacific-Asia Conference, PAKDD 2016, Auckland, New Zealand, April 19-22,... Advances in Knowledge Discovery and Data Mining - 20th Pacific-Asia Conference, PAKDD 2016, Auckland, New Zealand, April 19-22, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
James Bailey, Latifur Khan, Takashi Washio, Gill Dobbie, Joshua Zhexue Huang, …
R3,231 Discovery Miles 32 310 Ships in 10 - 15 working days

This two-volume set, LNAI 9651 and 9652, constitutes the thoroughly refereed proceedings of the 20th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2016, held in Auckland, New Zealand, in April 2016. The 91 full papers were carefully reviewed and selected from 307 submissions. They are organized in topical sections named: classification; machine learning; applications; novel methods and algorithms; opinion mining and sentiment analysis; clustering; feature extraction and pattern mining; graph and network data; spatiotemporal and image data; anomaly detection and clustering; novel models and algorithms; and text mining and recommender systems.

Advances in Knowledge Discovery and Data Mining - 20th Pacific-Asia Conference, PAKDD 2016, Auckland, New Zealand, April 19-22,... Advances in Knowledge Discovery and Data Mining - 20th Pacific-Asia Conference, PAKDD 2016, Auckland, New Zealand, April 19-22, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
James Bailey, Latifur Khan, Takashi Washio, Gill Dobbie, Joshua Zhexue Huang, …
R3,128 Discovery Miles 31 280 Ships in 10 - 15 working days

This two-volume set, LNAI 9651 and 9652, constitutes the thoroughly refereed proceedings of the 20th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2016, held in Auckland, New Zealand, in April 2016. The 91 full papers were carefully reviewed and selected from 307 submissions. They are organized in topical sections named: classification; machine learning; applications; novel methods and algorithms; opinion mining and sentiment analysis; clustering; feature extraction and pattern mining; graph and network data; spatiotemporal and image data; anomaly detection and clustering; novel models and algorithms; and text mining and recommender systems.

Analyzing and Securing Social Networks (Hardcover): Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu,... Analyzing and Securing Social Networks (Hardcover)
Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, …
R3,608 Discovery Miles 36 080 Ships in 12 - 17 working days

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bennett Read Steam Iron (2200W)
R592 Discovery Miles 5 920
Braai
Reuben Riffel Paperback R495 R359 Discovery Miles 3 590
Dala Craft Pom Poms - Assorted Colours…
R34 Discovery Miles 340
Brother JA1400 Basic Multi Purpose…
 (3)
R3,299 R2,299 Discovery Miles 22 990
Jabra Elite 5 Hybrid ANC True Wireless…
R2,899 R2,245 Discovery Miles 22 450
Dig & Discover: Dinosaurs - Excavate 2…
Hinkler Pty Ltd Kit R256 Discovery Miles 2 560
Efekto 77300-G Nitrile Gloves (M)(Green)
R63 Discovery Miles 630
Bestway Air Hammer Inflation Pump (36…
R139 R129 Discovery Miles 1 290
Deadpool 2 - Super Duper Cut
Ryan Reynolds Blu-ray disc R52 Discovery Miles 520
Blinde Mol Of Wyse Uil? - Hoe Om Met…
Susan Coetzer Paperback R270 R232 Discovery Miles 2 320

 

Partners