NLSUI OPAC header image

Data analysis for network cyber-security (Record no. 36915)

MARC details
000 -LEADER
fixed length control field 01812nam a2200217Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210405101755.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160316s2014 xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781783263745
040 ## - CATALOGING SOURCE
Transcribing agency n
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 343.099450
Item number ADA
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Adams Niall
245 ## - TITLE STATEMENT
Title Data analysis for network cyber-security
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. London
Name of publisher, distributor, etc. Imperial College Press
Date of publication, distribution, etc. 2014
300 ## - PHYSICAL DESCRIPTION
Extent 189p
Dimensions v
365 ## - TRADE PRICE
Price amount Rs. 5,895
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Summary: <br/>There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data analysis for network cyber-security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity. Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches. This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element 1. Computer Networks - Security Measures - Congresses
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Heard Nicholas
--
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type BOOKs
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
        . .   30.05.2017 5895.00   343.09945 ADA 31431 30.05.2017 30.05.2017 BOOKs