logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Data Mining Tools for Malware Detection by Mehedy Masud, Latifur Khan, Bhavani Thuraisingham ISBN 9781439854549, 9781439854556, 1439854548, 1439854556

  • SKU: EBN-4747658
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.3

37 reviews
Instant download (eBook) Data Mining Tools for Malware Detection after payment.
Authors:Mehedy Masud, Latifur Khan, Bhavani Thuraisingham
Pages:450 pages.
Year:2011
Editon:1
Publisher:Auerbach Publications,CRC Press
Language:english
File Size:8.97 MB
Format:pdf
ISBNS:9781439854549, 9781439854556, 1439854548, 1439854556
Categories: Ebooks

Product desciption

(Ebook) Data Mining Tools for Malware Detection by Mehedy Masud, Latifur Khan, Bhavani Thuraisingham ISBN 9781439854549, 9781439854556, 1439854548, 1439854556

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets.The authors describe the systems they have designed and developed: email worm detection using data mining, a scalable multi-level feature extraction technique to detect malicious executables, detecting remote exploits using data mining, and flow-based identification of botnet traffic by mining multiple log files. For each of these tools, they detail the system architecture, algorithms, performance results, and limitations. Discusses data mining for emerging applications, including adaptable malware detection, insider threat detection, firewall policy analysis, and real-time data miningIncludes four appendices that provide a firm foundation in data management, secure systems, and the semantic webDescribes the authors’ tools for stream data mining From algorithms to experimental results, this is one of the few books that will be equally valuable to those in industry, government, and academia. It will help technologists decide which tools to select for specific applications, managers will learn how to determine whether or not to proceed with a data mining project, and developers will find innovative alternative designs for a range of applications.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products