Autor: Richardson, Texas, USA) Khan Latifur (University of Texas at Dallas

Apoio

7 Ebooks por Richardson, Texas, USA) Khan Latifur (University of Texas at Dallas

Murat Kantarcioglu & Latifur Khan: Secure Data Science
Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques …
PDF
Inglês
DRM
€57.90
Murat Kantarcioglu & Latifur Khan: Secure Data Science
Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques …
EPUB
Inglês
DRM
€57.91
Latifur (University of Texas at Dallas, Richardson, Texas, USA) Khan & Mohammad Mehedy Masud: Big Data Analytics with Applications in Insider Threat Detection
Today”s malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that an …
EPUB
DRM
€54.62
Mamoun Awad & Latifur Khan: Design and Implementation of Data Mining Tools
Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, …
PDF
DRM
€84.48
Latifur Khan & Mehedy Masud: Data Mining Tools for Malware Detection
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical …
PDF
DRM
€154.43
Satyen Abrol & Raymond Heatherly: Analyzing and Securing Social Networks
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and …
PDF
DRM
€55.28
Latifur (University of Texas at Dallas, Richardson, Texas, USA) Khan & Mohammad Mehedy Masud: Big Data Analytics with Applications in Insider Threat Detection
Today”s malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that an …
PDF
DRM
€54.82