Secure Data Science
Secure Data Science
Integrating Cyber Security and Data Science
Khan, Latifur; Kantarcioglu, Murat; Thuraisingham, Bhavani
Taylor & Francis Ltd
05/2022
436
Dura
Inglês
9780367534103
15 a 20 dias
934
PART I Supporting Technologies for Secure Data Science
Introduction to Part I
Chapter 2 Data Security and Privacy
Chapter 3 Data Mining and Security
Chapter 4 Big Data, Cloud, Semantic Web, and Social Network Technologies
Chapter 5 Big Data Analytics, Security, and Privacy
Conclusion to Part I
PART II Data Science for Cyber Security
Introduction to Part II
Chapter 6 Data Science for Malicious Executables
Chapter 7 Stream Analytics for Malware Detection
Chapter 8 Cloud-Based Data Science for Malware Detection
Chapter 9 Data Science for Insider Threat Detection
Conclusion to Part II
PART III Security and Privacy-Enhanced Data Science
Introduction to Part III
Chapter 10 Adversarial Support Vector Machine Learning
Chapter 11 Adversarial Learning Using Relevance Vector Machine Ensembles
Chapter 12 Privacy Preserving Decision Trees
Chapter 13 Toward a Privacy-Aware Policy-Based Quantified Self-Data Management Framework
Chapter 14 Data Science, COVID-19 Pandemic, Privacy, and Civil Liberties
Conclusion to Part III
PART IV Access Control and Data Science
Introduction to Part IV
Chapter 15 Secure Cloud Query Processing Based on Access Control for Big Data Systems
Chapter 16 Access Control-Based Assured Information Sharing in the Cloud
Chapter 17 Access Control for Social Network Data Management
Chapter 18 Inference and Access Control for Big Data
Chapter 19 Emerging Applications for Secure Data Science: Internet of Transportation Systems
Conclusion to Part IV
Chapter 20 Summary and Directions
Appendix A: Data Management Systems: Developments and Trends
PART I Supporting Technologies for Secure Data Science
Introduction to Part I
Chapter 2 Data Security and Privacy
Chapter 3 Data Mining and Security
Chapter 4 Big Data, Cloud, Semantic Web, and Social Network Technologies
Chapter 5 Big Data Analytics, Security, and Privacy
Conclusion to Part I
PART II Data Science for Cyber Security
Introduction to Part II
Chapter 6 Data Science for Malicious Executables
Chapter 7 Stream Analytics for Malware Detection
Chapter 8 Cloud-Based Data Science for Malware Detection
Chapter 9 Data Science for Insider Threat Detection
Conclusion to Part II
PART III Security and Privacy-Enhanced Data Science
Introduction to Part III
Chapter 10 Adversarial Support Vector Machine Learning
Chapter 11 Adversarial Learning Using Relevance Vector Machine Ensembles
Chapter 12 Privacy Preserving Decision Trees
Chapter 13 Toward a Privacy-Aware Policy-Based Quantified Self-Data Management Framework
Chapter 14 Data Science, COVID-19 Pandemic, Privacy, and Civil Liberties
Conclusion to Part III
PART IV Access Control and Data Science
Introduction to Part IV
Chapter 15 Secure Cloud Query Processing Based on Access Control for Big Data Systems
Chapter 16 Access Control-Based Assured Information Sharing in the Cloud
Chapter 17 Access Control for Social Network Data Management
Chapter 18 Inference and Access Control for Big Data
Chapter 19 Emerging Applications for Secure Data Science: Internet of Transportation Systems
Conclusion to Part IV
Chapter 20 Summary and Directions
Appendix A: Data Management Systems: Developments and Trends