Applications of Data Mining in Computer Security:
Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2002
|
Ausgabe: | 1st ed. 2002 |
Schriftenreihe: | Advances in Information Security
6 |
Schlagworte: | |
Online-Zugang: | UBY01 URL des Eerstveröffentlichers |
Zusammenfassung: | Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security. Applications Of Data Mining In Computer Security concentrates heavily on the use of data mining in the area of intrusion detection. The reason for this is twofold. First, the volume of data dealing with both network and host activity is so large that it makes it an ideal candidate for using data mining techniques. Second, intrusion detection is an extremely critical activity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence |
Beschreibung: | 1 Online-Ressource (XX, 252 p) |
ISBN: | 9781461509530 |
DOI: | 10.1007/978-1-4615-0953-0 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064208 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2002 |||| o||u| ||||||eng d | ||
020 | |a 9781461509530 |9 978-1-4615-0953-0 | ||
024 | 7 | |a 10.1007/978-1-4615-0953-0 |2 doi | |
035 | |a (ZDB-2-SCS)978-1-4615-0953-0 | ||
035 | |a (OCoLC)1227480260 | ||
035 | |a (DE-599)BVBBV047064208 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 004.0151 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 530 |0 (DE-625)143679: |2 rvk | ||
245 | 1 | 0 | |a Applications of Data Mining in Computer Security |c edited by Daniel Barbará, Sushil Jajodia |
250 | |a 1st ed. 2002 | ||
264 | 1 | |a New York, NY |b Springer US |c 2002 | |
300 | |a 1 Online-Ressource (XX, 252 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in Information Security |v 6 | |
520 | |a Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security. Applications Of Data Mining In Computer Security concentrates heavily on the use of data mining in the area of intrusion detection. The reason for this is twofold. First, the volume of data dealing with both network and host activity is so large that it makes it an ideal candidate for using data mining techniques. Second, intrusion detection is an extremely critical activity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence | ||
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Computers | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Barbará, Daniel |4 edt | |
700 | 1 | |a Jajodia, Sushil |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781402070549 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461353218 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461509547 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4615-0953-0 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471320 | ||
966 | e | |u https://doi.org/10.1007/978-1-4615-0953-0 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182061928415232 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Barbará, Daniel Jajodia, Sushil |
author2_role | edt edt |
author2_variant | d b db s j sj |
author_facet | Barbará, Daniel Jajodia, Sushil |
building | Verbundindex |
bvnumber | BV047064208 |
classification_rvk | ST 276 ST 530 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-1-4615-0953-0 (OCoLC)1227480260 (DE-599)BVBBV047064208 |
dewey-full | 004.0151 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.0151 |
dewey-search | 004.0151 |
dewey-sort | 14.0151 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-1-4615-0953-0 |
edition | 1st ed. 2002 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03559nmm a2200673zcb4500</leader><controlfield tag="001">BV047064208</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461509530</subfield><subfield code="9">978-1-4615-0953-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4615-0953-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4615-0953-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227480260</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064208</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.0151</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 530</subfield><subfield code="0">(DE-625)143679:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applications of Data Mining in Computer Security</subfield><subfield code="c">edited by Daniel Barbará, Sushil Jajodia</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2002</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XX, 252 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">6</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security. Applications Of Data Mining In Computer Security concentrates heavily on the use of data mining in the area of intrusion detection. The reason for this is twofold. First, the volume of data dealing with both network and host activity is so large that it makes it an ideal candidate for using data mining techniques. Second, intrusion detection is an extremely critical activity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barbará, Daniel</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jajodia, Sushil</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781402070549</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461353218</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461509547</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4615-0953-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471320</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4615-0953-0</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV047064208 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:34Z |
institution | BVB |
isbn | 9781461509530 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471320 |
oclc_num | 1227480260 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XX, 252 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Springer US |
record_format | marc |
series2 | Advances in Information Security |
spelling | Applications of Data Mining in Computer Security edited by Daniel Barbará, Sushil Jajodia 1st ed. 2002 New York, NY Springer US 2002 1 Online-Ressource (XX, 252 p) txt rdacontent c rdamedia cr rdacarrier Advances in Information Security 6 Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security. Applications Of Data Mining In Computer Security concentrates heavily on the use of data mining in the area of intrusion detection. The reason for this is twofold. First, the volume of data dealing with both network and host activity is so large that it makes it an ideal candidate for using data mining techniques. Second, intrusion detection is an extremely critical activity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence Theory of Computation Cryptology Artificial Intelligence Data Structures and Information Theory Management of Computing and Information Systems Computer Communication Networks Computers Data encryption (Computer science) Artificial intelligence Data structures (Computer science) Management information systems Computer science Computer communication systems Computersicherheit (DE-588)4274324-2 gnd rswk-swf Data Mining (DE-588)4428654-5 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Data Mining (DE-588)4428654-5 s Computersicherheit (DE-588)4274324-2 s DE-604 Barbará, Daniel edt Jajodia, Sushil edt Erscheint auch als Druck-Ausgabe 9781402070549 Erscheint auch als Druck-Ausgabe 9781461353218 Erscheint auch als Druck-Ausgabe 9781461509547 https://doi.org/10.1007/978-1-4615-0953-0 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Applications of Data Mining in Computer Security Theory of Computation Cryptology Artificial Intelligence Data Structures and Information Theory Management of Computing and Information Systems Computer Communication Networks Computers Data encryption (Computer science) Artificial intelligence Data structures (Computer science) Management information systems Computer science Computer communication systems Computersicherheit (DE-588)4274324-2 gnd Data Mining (DE-588)4428654-5 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4428654-5 (DE-588)4143413-4 |
title | Applications of Data Mining in Computer Security |
title_auth | Applications of Data Mining in Computer Security |
title_exact_search | Applications of Data Mining in Computer Security |
title_exact_search_txtP | Applications of Data Mining in Computer Security |
title_full | Applications of Data Mining in Computer Security edited by Daniel Barbará, Sushil Jajodia |
title_fullStr | Applications of Data Mining in Computer Security edited by Daniel Barbará, Sushil Jajodia |
title_full_unstemmed | Applications of Data Mining in Computer Security edited by Daniel Barbará, Sushil Jajodia |
title_short | Applications of Data Mining in Computer Security |
title_sort | applications of data mining in computer security |
topic | Theory of Computation Cryptology Artificial Intelligence Data Structures and Information Theory Management of Computing and Information Systems Computer Communication Networks Computers Data encryption (Computer science) Artificial intelligence Data structures (Computer science) Management information systems Computer science Computer communication systems Computersicherheit (DE-588)4274324-2 gnd Data Mining (DE-588)4428654-5 gnd |
topic_facet | Theory of Computation Cryptology Artificial Intelligence Data Structures and Information Theory Management of Computing and Information Systems Computer Communication Networks Computers Data encryption (Computer science) Artificial intelligence Data structures (Computer science) Management information systems Computer science Computer communication systems Computersicherheit Data Mining Aufsatzsammlung |
url | https://doi.org/10.1007/978-1-4615-0953-0 |
work_keys_str_mv | AT barbaradaniel applicationsofdataminingincomputersecurity AT jajodiasushil applicationsofdataminingincomputersecurity |