Big Data Analytics in Cybersecurity
Sold by ThriftBooks-Dallas, Dallas, TX, U.S.A.
AbeBooks Seller since 2 July 2009
Used - Soft cover
Condition: Used - Very good
Quantity: 1 available
Add to basketSold by ThriftBooks-Dallas, Dallas, TX, U.S.A.
AbeBooks Seller since 2 July 2009
Condition: Used - Very good
Quantity: 1 available
Add to basketMay have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Seller Inventory # G1032096365I4N00
Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of driving. Big data analytics, as an emerging analytical technology, offers the capability to collect, store, process, and visualize these vast amounts of data. Big Data Analytics in Cybersecurity examines security challenges surrounding big data and provides actionable insights that can be used to improve the current practices of network operators and administrators.
Applying big data analytics in cybersecurity is critical. By exploiting data from the networks and computers, analysts can discover useful network information from data. Decision makers can make more informative decisions by using this analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, tools, and other aspects of the network processes.
Bringing together experts from academia, government laboratories, and industry, the book provides insight to both new and more experienced security professionals, as well as data analytics professionals who have varying levels of cybersecurity expertise. It covers a wide range of topics in cybersecurity, which include:
In addition, emerging security domains such as the IoT, cloud computing, fog computing, mobile computing, and cyber-social networks are examined.
The book first focuses on how big data analytics can be used in different aspects of cybersecurity including network forensics, root-cause analysis, and security training. Next it discusses big data challenges and solutions in such emerging cybersecurity domains as fog computing, IoT, and mobile app security. The book concludes by presenting the tools and datasets for future cybersecurity research.
Dr. Onur Savas is a data scientist at Intelligent Automation, Inc. (IAI), Rockville, MD. As a data scientist, he performs research and development (R&D), leads a team of data scientists, software engineers, and programmers, and contributes to IAI’s increasing portfolio of products. He has more than 10 years of R&D expertise in the areas of networks and security, social media, distributed algorithms, sensors, and statistics. His recent work focuses on all aspects of big data analytics and cloud computing with applications to network management, cybersecurity, and social networks. Dr. Savas has a PhD in electrical and computer engineering from Boston University, Boston, MA, and is the author of numerous publications in leading journals and conferences. At IAI, he has been the recipient of various R&D contracts from DARPA, ONR, ARL, AFRL, CTTSO, NASA, and other federal agencies. His work at IAI has contributed to the development and commercialization of IAI’s social media analytics tool Scraawl® (www.scraawl.com).
Dr. Julia Deng is a principal scientist and Sr. Director of Network and Security Group at Intelligent Automation, Inc. (IAI), Rockville, MD. She leads a team of more than 40 scientists and engineers, and during her tenure at IAI, she has been instrumental in growing IAI’s research portfolio in networks and cybersecurity. In her role as a principal investigator and principal scientist, she initiated and directed numerous R&D programs in the areas of airborne networks, cybersecurity, network management, wireless networks, trusted computing, embedded system, cognitive radio networks, big data analytics, and cloud computing. Dr. Deng has a PhD from the University of Cincinnati, Cincinnati, OH, and has published over 30 papers in leading international journals and conference proceedings.
"About this title" may belong to another edition of this title.
We guarantee each book that we send you. If you have any problems, please contact
our dedicated customer service department. They will do everything possible to
ensure you are happy with your order.
All domestic Standard and Expedited shipments are distributed from our warehouses by OSM, then handed off to the USPS for final delivery.
2-Day Shipping is delivered by FedEx, which does not deliver to PO boxes.
International shipments are tendered to the local postal service in the destination country for final delivery – we do not use courier services for international deliveries.
| Order quantity | 4 to 8 business days | 4 to 8 business days |
|---|---|---|
| First item | £ 0.00 | £ 0.00 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.