Data mining for security applications

Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Citations (Scopus)

Abstract

In this paper we discuss various data mining techniques that we have successfully applied for cyber security. These applications include but are not limited to malicious code detection by mining binary executables, network intrusion detection by mining network traffic, anomaly detection, and data stream mining. We summarize our achievements and current works at the University of Texas at Dallas on intrusion detection, and cyber-security research.

Original languageEnglish
Title of host publicationProceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Pages585-589
Number of pages5
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 - Shanghai, China
Duration: Dec 17 2008Dec 20 2008

Publication series

NameProceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Volume2

Other

Other5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Country/TerritoryChina
CityShanghai
Period12/17/0812/20/08

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Communication

Fingerprint

Dive into the research topics of 'Data mining for security applications'. Together they form a unique fingerprint.

Cite this