Cybersecurity and Data Science

The reprint focuses on the latest research in cybersecurity and data science. Digital transformation turns data into the new oil, so the increasing availability of big data, structured and unstructured datasets, raises new challenges in cybersecurity, efficient data processing and knowledge extracti...

Full description

Saved in:
Bibliographic Details
Other Authors: Szczypiorski, Krzysztof (Editor)
Format: Electronic Book Chapter
Language:English
Published: Basel MDPI - Multidisciplinary Digital Publishing Institute 2023
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_98972
005 20230405
003 oapen
006 m o d
007 cr|mn|---annan
008 20230405s2023 xx |||||o ||| 0|eng d
020 |a books978-3-0365-6907-9 
020 |a 9783036569062 
020 |a 9783036569079 
040 |a oapen  |c oapen 
024 7 |a 10.3390/books978-3-0365-6907-9  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a KNTX  |2 bicssc 
100 1 |a Szczypiorski, Krzysztof  |4 edt 
700 1 |a Szczypiorski, Krzysztof  |4 oth 
245 1 0 |a Cybersecurity and Data Science 
260 |a Basel  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2023 
300 |a 1 electronic resource (320 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a The reprint focuses on the latest research in cybersecurity and data science. Digital transformation turns data into the new oil, so the increasing availability of big data, structured and unstructured datasets, raises new challenges in cybersecurity, efficient data processing and knowledge extraction. The field of cybersecurity and data science fuels the data-driven economy. Innovations in this field require strong foundations in mathematics, statistics, machine learning and information security. The unprecedented increase in the availability of data in many fields of science and technology (e.g., genomic data, data from industrial environments, network traffic, streaming media, sensory data of smart cities, and social network data) ask for new methods and solutions for data processing, information extraction and decision support. This stimulates the development of new methods of data analysis, including those adapted to the analysis of new data structures and the growing volume of data. The papers included in this reprint discuss various topics ranging from cyberattacks, steganography, anomaly detection, evaluation of the attacker skills, modelling of the threats, and wireless security evaluation, as well as artificial intelligence, machine learning, and deep learning. Given this diversity of topics the book represents a valuable reference for researchers in cybersecurity security and data science. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Information technology industries  |2 bicssc 
653 |a steganography 
653 |a network security 
653 |a steganography detection 
653 |a steganalysis 
653 |a machine learning 
653 |a big data 
653 |a IoT 
653 |a pattern mining 
653 |a wireless communications 
653 |a covert channel 
653 |a dirty constellation 
653 |a wireless postmodulation steganography 
653 |a phase drift 
653 |a drift correction modulation 
653 |a undetectability 
653 |a security 
653 |a quadrature amplitude modulation 
653 |a spam 
653 |a phishing 
653 |a classification 
653 |a augmented dataset 
653 |a multi-language emails 
653 |a cybersecurity 
653 |a data protection 
653 |a SoC 
653 |a threat agents 
653 |a motivation 
653 |a opportunity 
653 |a capability 
653 |a user profiling 
653 |a implicit 
653 |a modeling 
653 |a real-time user monitoring 
653 |a complexity threat agent 
653 |a threat assessment 
653 |a network traffic analysis 
653 |a convolutional neural networks 
653 |a network traffic images 
653 |a visualization of traffic 
653 |a classifiers 
653 |a e-mail 
653 |a ham 
653 |a data science 
653 |a datasets 
653 |a cyber threats modeling 
653 |a multi-agent systems 
653 |a cyber deception 
653 |a pseudorandom sequences generators 
653 |a prime numbers 
653 |a additive Fibonacci generator 
653 |a statistical characteristics 
653 |a android device 
653 |a BrainShield 
653 |a hybrid model 
653 |a malware detection 
653 |a Omnidroid 
653 |a image processing 
653 |a BOSS database 
653 |a ensemble classifier 
653 |a deep learning 
653 |a stegomalware 
653 |a traffic analysis 
653 |a network probe 
653 |a hash function 
653 |a SHA-3 
653 |a FPGA 
653 |a cognitive security 
653 |a cyberattacks 
653 |a game software 
653 |a threat matrix computing 
653 |a evaluation function 
653 |a data modeling 
653 |a authentication 
653 |a bit template 
653 |a information-processing electronic device 
653 |a Poisson pulse sequences generators 
653 |a n/a 
856 4 0 |a www.oapen.org  |u https://mdpi.com/books/pdfview/book/7034  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/98972  |7 0  |z DOAB: description of the publication