The Resource Applications of data mining in computer security, edited by Daniel Barbarʹa, Sushil Jajodia

Applications of data mining in computer security, edited by Daniel Barbarʹa, Sushil Jajodia

Label
Applications of data mining in computer security
Title
Applications of data mining in computer security
Statement of responsibility
edited by Daniel Barbarʹa, Sushil Jajodia
Contributor
Subject
Language
eng
Summary
  • "Applications of Data Mining in Computer Security concentrates heavily on the use of data mining in the area of intrusion detection. The reason for this is twofold. First, the volume of data dealing with both network and host activity is so large that it makes it an ideal candidate for using data mining techniques. Second, intrusion detection is an extremely critical activity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence."
  • "Applications of Data Mining in Computer Security is designed to meet the needs of a professional audience composed of researchers and practitioners in industry and graduate level students in computer science."--Jacket
Member of
Cataloging source
DLC
Illustrations
illustrations
Index
index present
LC call number
QA76.9.D343
LC item number
A35 2002
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Barbara, Daniel
  • Jajodia, Sushil
http://library.link/vocab/subjectName
  • Data mining
  • Computer security
  • Exploration de données (Informatique)
  • Sécurité informatique
  • Computer security
  • Data mining
  • Aufsatzsammlung
  • Computersicherheit
  • Data Mining
Label
Applications of data mining in computer security, edited by Daniel Barbarʹa, Sushil Jajodia
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Daniel Barbara, Julia Couto and Sushil Jajodia
  • [and others]
  • 4.
  • A Geometric Framework for Unsupervised Anomaly Detection
  • Eleazar Eskin, Andrew Arnold and Michael Prerau
  • [et al.]
  • 5.
  • Fusing a Heterogeneous Alert Stream into Scenarios
  • Oliver Dain and Robert K. Cunningham
  • 6.
  • 1.
  • Using MIB II Variables for Network Intrusion Detection
  • Xinzhou Qin, Wenke Lee and Lundy Lewis
  • [et al.]
  • 7.
  • Adaptive Model Generation
  • Andrew Honig, Andrew Howard and Eleazar Eskin
  • [et al.]
  • Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt
  • Steven Noel, Duminda Wijesekera and Charles Youman
  • 2.
  • Data Mining for Intrusion Detection
  • Klaus Julisch
  • 3.
  • An Architecture for Anomaly Detection
Dimensions
25 cm.
Extent
xx, 252 pages
Isbn
9781402070549
Lccn
2002025668
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
System control number
  • (OCoLC)49421772
  • (OCoLC)ocm49421772
Label
Applications of data mining in computer security, edited by Daniel Barbarʹa, Sushil Jajodia
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Daniel Barbara, Julia Couto and Sushil Jajodia
  • [and others]
  • 4.
  • A Geometric Framework for Unsupervised Anomaly Detection
  • Eleazar Eskin, Andrew Arnold and Michael Prerau
  • [et al.]
  • 5.
  • Fusing a Heterogeneous Alert Stream into Scenarios
  • Oliver Dain and Robert K. Cunningham
  • 6.
  • 1.
  • Using MIB II Variables for Network Intrusion Detection
  • Xinzhou Qin, Wenke Lee and Lundy Lewis
  • [et al.]
  • 7.
  • Adaptive Model Generation
  • Andrew Honig, Andrew Howard and Eleazar Eskin
  • [et al.]
  • Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt
  • Steven Noel, Duminda Wijesekera and Charles Youman
  • 2.
  • Data Mining for Intrusion Detection
  • Klaus Julisch
  • 3.
  • An Architecture for Anomaly Detection
Dimensions
25 cm.
Extent
xx, 252 pages
Isbn
9781402070549
Lccn
2002025668
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
System control number
  • (OCoLC)49421772
  • (OCoLC)ocm49421772

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...