Author: | Nick Heard, Niall Adams, Patrick Rubin-Delanchy, Melissa Turcotte | ISBN: | 9781786345653 |
Publisher: | World Scientific Publishing Company | Publication: | September 25, 2018 |
Imprint: | WSPC (EUROPE) | Language: | English |
Author: | Nick Heard, Niall Adams, Patrick Rubin-Delanchy, Melissa Turcotte |
ISBN: | 9781786345653 |
Publisher: | World Scientific Publishing Company |
Publication: | September 25, 2018 |
Imprint: | WSPC (EUROPE) |
Language: | English |
Cyber-security is a matter of rapidly growing importance in industry and government. This book provides insight into a range of data science techniques for addressing these pressing concerns.
The application of statistical and broader data science techniques provides an exciting growth area in the design of cyber defences. Networks of connected devices, such as enterprise computer networks or the wider so-called Internet of Things, are all vulnerable to misuse and attack, and data science methods offer the promise to detect such behaviours from the vast collections of cyber traffic data sources that can be obtained. In many cases, this is achieved through anomaly detection of unusual behaviour against understood statistical models of normality.
This volume presents contributed papers from an international conference of the same name held at Imperial College. Experts from the field have provided their latest discoveries and review state of the art technologies.
Contents:
Readership: Researchers at all levels in cyber-security and data science.
Key Features:
Cyber-security is a matter of rapidly growing importance in industry and government. This book provides insight into a range of data science techniques for addressing these pressing concerns.
The application of statistical and broader data science techniques provides an exciting growth area in the design of cyber defences. Networks of connected devices, such as enterprise computer networks or the wider so-called Internet of Things, are all vulnerable to misuse and attack, and data science methods offer the promise to detect such behaviours from the vast collections of cyber traffic data sources that can be obtained. In many cases, this is achieved through anomaly detection of unusual behaviour against understood statistical models of normality.
This volume presents contributed papers from an international conference of the same name held at Imperial College. Experts from the field have provided their latest discoveries and review state of the art technologies.
Contents:
Readership: Researchers at all levels in cyber-security and data science.
Key Features: