Secure data science : integrating cyber security and data science /: integrating cyber security and data science. (2022)
- Record Type:
- Book
- Title:
- Secure data science : integrating cyber security and data science /: integrating cyber security and data science. (2022)
- Main Title:
- Secure data science : integrating cyber security and data science
- Further Information:
- Note: Bhavani Thuraisingham, Murat Kantarcioglu, Latifur Khan.
- Authors:
- Thuraisingham, Bhavani M
Kantarcioglu, Murat
Khan, Latifur - Contents:
- Chapter 1 Introduction PART I Supporting Technologies for Secure Data Science Introduction to Part I Chapter 2 Data Security and Privacy Chapter 3 Data Mining and Security Chapter 4 Big Data, Cloud, Semantic Web, and Social Network Technologies Chapter 5 Big Data Analytics, Security, and Privacy Conclusion to Part I PART II Data Science for Cyber Security Introduction to Part II Chapter 6 Data Science for Malicious Executables Chapter 7 Stream Analytics for Malware Detection Chapter 8 Cloud-Based Data Science for Malware Detection Chapter 9 Data Science for Insider Threat Detection Conclusion to Part II PART III Security and Privacy-Enhanced Data Science Introduction to Part III Chapter 10 Adversarial Support Vector Machine Learning Chapter 11 Adversarial Learning Using Relevance Vector Machine Ensembles Chapter 12 Privacy Preserving Decision Trees Chapter 13 Toward a Privacy-Aware Policy-Based Quantified Self-Data Management Framework Chapter 14 Data Science, COVID-19 Pandemic, Privacy, and Civil Liberties Conclusion to Part III PART IV Access Control and Data Science Introduction to Part IV Chapter 15 Secure Cloud Query Processing Based on Access Control for Big Data Systems Chapter 16 Access Control-Based Assured Information Sharing in the Cloud Chapter 17 Access Control for Social Network Data Management Chapter 18 Inference and Access Control for Big Data Chapter 19 Emerging Applications for Secure Data Science: Internet of Transportation Systems Conclusion to Part IVChapter 1 Introduction PART I Supporting Technologies for Secure Data Science Introduction to Part I Chapter 2 Data Security and Privacy Chapter 3 Data Mining and Security Chapter 4 Big Data, Cloud, Semantic Web, and Social Network Technologies Chapter 5 Big Data Analytics, Security, and Privacy Conclusion to Part I PART II Data Science for Cyber Security Introduction to Part II Chapter 6 Data Science for Malicious Executables Chapter 7 Stream Analytics for Malware Detection Chapter 8 Cloud-Based Data Science for Malware Detection Chapter 9 Data Science for Insider Threat Detection Conclusion to Part II PART III Security and Privacy-Enhanced Data Science Introduction to Part III Chapter 10 Adversarial Support Vector Machine Learning Chapter 11 Adversarial Learning Using Relevance Vector Machine Ensembles Chapter 12 Privacy Preserving Decision Trees Chapter 13 Toward a Privacy-Aware Policy-Based Quantified Self-Data Management Framework Chapter 14 Data Science, COVID-19 Pandemic, Privacy, and Civil Liberties Conclusion to Part III PART IV Access Control and Data Science Introduction to Part IV Chapter 15 Secure Cloud Query Processing Based on Access Control for Big Data Systems Chapter 16 Access Control-Based Assured Information Sharing in the Cloud Chapter 17 Access Control for Social Network Data Management Chapter 18 Inference and Access Control for Big Data Chapter 19 Emerging Applications for Secure Data Science: Internet of Transportation Systems Conclusion to Part IV Chapter 20 Summary and Directions Appendix A: Data Management Systems: Developments and Trends … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : CRC Press
- Publication Date:
- 2022
- Extent:
- 1 online resource, illustrations (black and white)
- Subjects:
- 006.312
Data mining
Computer security - Languages:
- English
- ISBNs:
- 9781000557510
9781000557503
9781003081845 - Related ISBNs:
- 9780367534103
- Notes:
- Note: Description based on CIP data; resource not viewed.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.673173
- Ingest File:
- 10_012.xml