Feedback

X
Cybersecurity and Data Science

Cybersecurity and Data Science

0 Ungluers have Faved this Work
The reprint focuses on the latest research in cybersecurity and data science. Digital transformation turns data into the new oil, so the increasing availability of big data, structured and unstructured datasets, raises new challenges in cybersecurity, efficient data processing and knowledge extraction. The field of cybersecurity and data science fuels the data-driven economy. Innovations in this field require strong foundations in mathematics, statistics, machine learning and information security. The unprecedented increase in the availability of data in many fields of science and technology (e.g., genomic data, data from industrial environments, network traffic, streaming media, sensory data of smart cities, and social network data) ask for new methods and solutions for data processing, information extraction and decision support. This stimulates the development of new methods of data analysis, including those adapted to the analysis of new data structures and the growing volume of data. The papers included in this reprint discuss various topics ranging from cyberattacks, steganography, anomaly detection, evaluation of the attacker skills, modelling of the threats, and wireless security evaluation, as well as artificial intelligence, machine learning, and deep learning. Given this diversity of topics the book represents a valuable reference for researchers in cybersecurity security and data science.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 19 times via unglue.it ebook links.
  1. 19 - pdf (CC BY) at Unglue.it.

Keywords

  • additive Fibonacci generator
  • android device
  • augmented dataset
  • authentication
  • big data
  • bit template
  • BOSS database
  • BrainShield
  • capability
  • Classification
  • classifiers
  • cognitive security
  • complexity threat agent
  • convolutional neural networks
  • covert channel
  • cyber deception
  • cyber threats modeling
  • cyberattacks
  • cybersecurity
  • Data Modeling
  • Data protection
  • Data science
  • datasets
  • deep learning
  • dirty constellation
  • drift correction modulation
  • E-Mail
  • Economics, finance, business & management
  • ensemble classifier
  • evaluation function
  • FPGA
  • game software
  • HAM
  • hash function
  • hybrid model
  • Image processing
  • implicit
  • Industry & industrial studies
  • Information technology industries
  • information-processing electronic device
  • IoT
  • Machine learning
  • Malware detection
  • Media, information & communication industries
  • modeling
  • Motivation
  • multi-agent systems
  • multi-language emails
  • n/a
  • network probe
  • network security
  • network traffic analysis
  • network traffic images
  • Omnidroid
  • Opportunity
  • pattern mining
  • phase drift
  • phishing
  • Poisson pulse sequences generators
  • Prime Numbers
  • pseudorandom sequences generators
  • quadrature amplitude modulation
  • real-time user monitoring
  • security
  • SHA-3
  • SOC
  • spam
  • statistical characteristics
  • steganalysis
  • steganography
  • steganography detection
  • stegomalware
  • threat agents
  • threat assessment
  • threat matrix computing
  • traffic analysis
  • undetectability
  • user profiling
  • visualization of traffic
  • wireless communications
  • wireless postmodulation steganography

Links

DOI: 10.3390/books978-3-0365-6907-9

Editions

edition cover

Share

Copy/paste this into your site: