Data Mining for Cyber Security

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Mining for Cyber Security

This chapter provides an overview of the Minnesota Intrusion Detection System (MINDS), which uses a suite of data mining based algorithms to address different aspects of cyber security. The various components of MINDS such as the scan detector, anomaly detector and the profiling module detect different types of attacks and intrusions on a computer network. The scan detector aims at detecting sc...

متن کامل

Data Warehousing and Data Mining Techniques for Cyber Security

Why should wait for some days to get or receive the data warehousing and data mining techniques for cyber security advances in information security book that you order? Why should you take it if you can get the faster one? You can find the same book that you order right here. This is it the book that you can receive directly after purchasing. This data warehousing and data mining techniques for...

متن کامل

Data Mining for Security Applications

This is a summary of discussions at Workshop on Data Mining for Security Applications CCS’01, PA. In this document data mining takes a broad meaning which may, sometimes, include machine learning (ML) and artificial intelligence (AI). Furthermore, forensics and intrusion detection are interchangeable in some contexts. Please note it is beyond the scope of our discussions to provide better defin...

متن کامل

Security and Data Mining

Database mining can be defined as the process of mining for implicit, previously unknown, and potentially useful information from very large databases by efficient knowledge discovery techniques. Naturally such a process may open up new inference channels, detect new intrusion patterns, and raises new security problems. New security concern and research problems are addressed and identified. Fi...

متن کامل

Cert Data to Analyze International Cyber Security

With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The Explorations in Cyber International Relations (ECIR) Data Dashboard Project is an initiative to gather worldwide cybersecurity data publicly provided by nation-level Computer Emerg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: AFRREV STECH: An International Journal of Science and Technology

سال: 2014

ISSN: 2227-5444,2225-8612

DOI: 10.4314/stech.v3i3.10