To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter gets into the techniques of data analytics, focusing on the three pillars of data mining, namely clustering, classification, and association rule mining, and how each can be used for cybersecurity. This chapter can be seen as a crash course in data mining. It begins with an understanding of the overall knowledge discovery and data mining process models and follows the elements of the data life cycle. This chapter outlines foundational elements such as measures of similarity and measures of evaluation. It outlines the landscape of various algorithms in clustering, classification, and frequent and rare patterns.
This chapter discusses several key directions such as data analytics in cyberphysical systems, multidomain mining, machine Learning concepts such as deep learning, generative adversarial networks, and challenges of model reuse. Last but not the least, the chapter closes with thoughts on ethical thinking in the data analytics process.
Focusing on what are anomalies are and more specifically what are anomalies in the cybersecurity domain, this chapter discusses some of the features of anomalies.
Focusing on understanding sources of cybersecurity data, this chapter explores the end-to-end opportunities for data collection. It goes on to discuss the sources of cybersecurity data and how multiple datasets can be leveraged in understanding cyber threats.
This chapter focuses on techniques of detecting anomalies, starting with some of the basic statistical techniques and going into data analytics techniques.
Delving into the specifics of spatial and temporal analytics, this chapter explores topics such as spatial neighborhood and temporal evolution of large amounts of network traffic data.
This chapter introduces the basic concepts of cybersecurity and the data analytics perspective to cybersecurity. It lays out the areas of study and how data analytics should be a key part of the spectrum of cybersecurity solutions.
Focusing on the big data elements of cybersecurity, this chapter looks at the landscape of the big data technologies and the complexities of the different types of data, including spatial and graph data. It outlines examples in these complex data types and how they can be evaluated using data analytics.
Recommend this
Email your librarian or administrator to recommend adding this to your organisation's collection.