TY - BOOK
T1 - Big data analytics with applications in insider threat detection
AU - Thuraisingham, Bhavani
AU - Mehedy Masud, Mohammad
AU - Parveen, Pallabi
AU - Khan, Latifur
N1 - Publisher Copyright:
© 2018 by Taylor & Francis Group, LLC.
PY - 2017/1/1
Y1 - 2017/1/1
N2 - Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.
AB - Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.
UR - http://www.scopus.com/inward/record.url?scp=85049669086&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85049669086&partnerID=8YFLogxK
U2 - 10.1201/9781315119458
DO - 10.1201/9781315119458
M3 - Book
AN - SCOPUS:85049669086
SN - 9781498705479
BT - Big data analytics with applications in insider threat detection
PB - CRC Press
ER -