Secure Data Science

Secure Data Science

Integrating Cyber Security and Data Science

Khan, Latifur; Kantarcioglu, Murat; Thuraisingham, Bhavani

Taylor & Francis Ltd

05/2022

436

Dura

Inglês

9780367534103

15 a 20 dias

934

Descrição não disponível.
Chapter 1 Introduction

PART I Supporting Technologies for Secure Data Science

Introduction to Part I

Chapter 2 Data Security and Privacy

Chapter 3 Data Mining and Security

Chapter 4 Big Data, Cloud, Semantic Web, and Social Network Technologies

Chapter 5 Big Data Analytics, Security, and Privacy

Conclusion to Part I

PART II Data Science for Cyber Security

Introduction to Part II

Chapter 6 Data Science for Malicious Executables

Chapter 7 Stream Analytics for Malware Detection

Chapter 8 Cloud-Based Data Science for Malware Detection

Chapter 9 Data Science for Insider Threat Detection

Conclusion to Part II

PART III Security and Privacy-Enhanced Data Science

Introduction to Part III

Chapter 10 Adversarial Support Vector Machine Learning

Chapter 11 Adversarial Learning Using Relevance Vector Machine Ensembles

Chapter 12 Privacy Preserving Decision Trees

Chapter 13 Toward a Privacy-Aware Policy-Based Quantified Self-Data Management Framework

Chapter 14 Data Science, COVID-19 Pandemic, Privacy, and Civil Liberties

Conclusion to Part III

PART IV Access Control and Data Science

Introduction to Part IV

Chapter 15 Secure Cloud Query Processing Based on Access Control for Big Data Systems

Chapter 16 Access Control-Based Assured Information Sharing in the Cloud

Chapter 17 Access Control for Social Network Data Management

Chapter 18 Inference and Access Control for Big Data

Chapter 19 Emerging Applications for Secure Data Science: Internet of Transportation Systems

Conclusion to Part IV

Chapter 20 Summary and Directions

Appendix A: Data Management Systems: Developments and Trends
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Data Science;Data Security;Big Data;Insider Threat Detection;Cybersecurity;Access Control Policies;Cyber Security Applications;Semantic Web;Cyber Security;Data Science Techniques;Big Data Security;Malware Detection;Semantic Web Technologies;SPARQL Query;RDF Graph;Cloud Computing;SVM;Part III;Big Data Systems;Data Chunk;RDF Data;Inference Controller;Data Mining;Big Data Management;RDF Triple;Privacy Preserving Data Mining;MapReduce Job;Cloud-centric Assured Information Sharing