Big data analytics with applications in insider threat detection /
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | Thuraisingham, Bhavani M. (Autor), Masud, Mehedy (Autor), Parveen, Pallabi (Autor), Khan, Latifur (Autor) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton, FL :
CRC Press,
[2018]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Data mining tools for malware detection /
por: Masud, Mehedy, et al.
Publicado: (2016) -
Malware forensics field guide for Windows systems : digital forensics field guides /
por: Malin, Cameron H.
Publicado: (2012) -
The Ransomware Threat Landscape : Prepare for, Recognise and Survive Ransomware Attacks.
por: Calder, Alan
Publicado: (2021) -
Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them /
por: Skulkin, Oleg
Publicado: (2022) -
The ransomware dilemma : the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attack /
por: Leo, Philipp, et al.
Publicado: (2022)