125,95 €
125,95 €
inkl. MwSt.
Sofort per Download lieferbar
125,95 €
125,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
Als Download kaufen
125,95 €
inkl. MwSt.
Sofort per Download lieferbar
Jetzt verschenken
125,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
  • Format: ePub

Presenting theoretical concepts, practical techniques, and experimental results, this book provides a step-by-step illustration of how data mining tools are developed for malware detection. Foscusing on email worms, malicious code, remote exploits, and botnets, the authors describe the step-by-step systems development for each of the four applications. They also discuss experimental and performance results, unique contributions of the system, and the limitations. The appendices include information on data management, data mining, data security, and the design and implementation of data mining tools.…mehr

  • Geräte: eReader
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 2.53MB
Produktbeschreibung
Presenting theoretical concepts, practical techniques, and experimental results, this book provides a step-by-step illustration of how data mining tools are developed for malware detection. Foscusing on email worms, malicious code, remote exploits, and botnets, the authors describe the step-by-step systems development for each of the four applications. They also discuss experimental and performance results, unique contributions of the system, and the limitations. The appendices include information on data management, data mining, data security, and the design and implementation of data mining tools.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Mehedy Masud is a postdoctoral fellow at the University of Texas at Dallas (UTD), where he earned his PhD in computer science in December 2009. He has published in premier journals and conferences, including IEEE Transactions on Knowledge and Data Engineering and the IEEE Data Mining Conference. He will be appointed as a research assistant professor at UTD in Fall 2012. Masud's research projects include reactively adaptive malware, data mining for detecting malicious executables, botnet, and remote exploits, and cloud data mining. He has a patent pending on stream mining for novel class detection.

Latifur Khan is an associate professor in the computer science department at the University of Texas at Dallas, where he has been teaching and conducting research since September 2000. He received his PhD and MS degrees in computer science from the University of Southern California in August 2000 and December 1996, respectively. Khan is (or has been) supported by grants from NASA, the National Science Foundation (NSF), Air Force Office of Scientific Research (AFOSR), Raytheon, NGA, IARPA, Tektronix, Nokia Research Center, Alcatel, and the SUN academic equipment grant program. In addition, Khan is the director of the state-of-the-art DML@UTD, UTD Data Mining/Database Laboratory, which is the primary center of research related to data mining, semantic web, and image/videoannotation at the University of Texas at Dallas. Khan has published more than 100 papers, including articles in several IEEE Transactions journals, the Journal of Web Semantics, and the VLDB Journal and conference proceedings such as IEEE ICDM and PKDD. He is a senior member of IEEE.

Bhavani Thuraisingham joined the University of Texas at Dallas (UTD) in October 2004 as a professor of computer science and director of the Cyber Security Research Center in the Erik Jonsson School of Engin