Login

Kumar, Vipin

Managing Cyber Threats

Managing Cyber Threats

99,20€

PDF with Adobe DRM
ISBN: 9780387242309
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

Part I. Overview

1. Managing Threats to Web Databases and Cyber Systems
Bhavani Thuraisingham

2. Intrusion Detection: A Survey
Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava

Part II. Data Mining Based Analysis of Computer Attacks

3. Learning Rules and Clusters for Anomaly Detection in Network Traffic
Philip K. Chan, Matthew V. Mahoney, Muhammad H. Arshad

4. Statistical Causality Analysis of Infosec Alert Data
Wenke Lee, Xinzhou Qin

5. Understanding Network Security Data: Using Aggregation, Anomaly Detection, and Cluster Analysis for Summarization
Dave DeBarr

Part III. Techniques for Managing Cyber Vulnerabilities and Alerts

6. Early Detection of Active Internet Worms
Vincent H. Berk, George V. Cybenko, Robert S. Gray

7. Sensor Families for Intrusion Detection Infrastructures
Richard A. Kemmerer, Giovanni Vigna

8. Encapsulation of User’s Intent: A New Proactive Intrusion Assessment Paradigm
Shambhu Upadhyaya, Ramkumar Chinchani, Kiran Mantha, Kevin Kwiat

9. Topological Analysis of Network Attack Vulnerability
Sushil Jajodia, Steven Noel, Brian O’Berry

10. Analyzing Survivable Computation in Critical Infrastructures
Yvo Desmedt

11. Alert Management Systems: A Quick Introduction
Robert L. Grossman

Part IV. Cyber Forensics

12. Cyber Forensics: Managing, Modeling, and Mining Data for Investigation
Erin E. Kenneally, Tony Fountain

13. Cyber Forensics: Issues and Approaches
Jau-Hwang Wang

Keywords: Computer Science, Information Systems and Communication Service, Information Systems Applications (incl.Internet)

Author(s)
 
 
Publisher
Springer
Publication year
2005
Language
en
Edition
1
Series
Massive Computing
Category
Information Technology, Telecommunications
Format
Ebook
eISBN (PDF)
9780387242309

Similar titles