Listing 1 - 10 of 27 | << page >> |
Sort by
|
Choose an application
Modern society depends critically on computers that control and manage systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats. This book brings together the latest techniques for managing cyber threats, developed by some of the world’s leading experts in the area. The book includes broad surveys on a number of topics, as well as specific techniques. It provides an excellent reference point for researchers and practitioners in the government, academic, and industrial communities who want to understand the issues and challenges in this area of growing worldwide importance. Audience This book is intended for members of the computer security research and development community interested in state-of-the-art techniques; personnel in federal organizations tasked with managing cyber threats and information leaks from computer systems; personnel at the military and intelligence agencies tasked with defensive and offensive information warfare; personnel in the commercial sector tasked with detection and prevention of fraud in their systems; and personnel running large-scale data centers, either for their organization or for others, tasked with ensuring the security, integrity, and availability of data.
Computer networks --- Computer security. --- Data mining. --- Computer crimes --- Security measures. --- Investigation. --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Criminal investigation --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Protection --- Security measures --- Information systems. --- Information Systems and Communication Service. --- Information Systems Applications (incl. Internet). --- Computers. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace
Choose an application
Choose an application
Complex analysis --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- IR (information retrieval) --- complexe analyse (wiskunde) --- data mining --- informatiesystemen --- database management --- KI (kunstmatige intelligentie) --- computernetwerken --- robots --- AI (artificiële intelligentie)
Choose an application
Complex analysis --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- IR (information retrieval) --- complexe analyse (wiskunde) --- data mining --- informatiesystemen --- database management --- KI (kunstmatige intelligentie) --- computernetwerken --- robots --- AI (artificiële intelligentie)
Choose an application
This book addresses prediction, mining and analysis of offline characteristics and behaviors from online data and vice versa. Each chapter will focus on a different aspect of virtual worlds to real world prediction e.g., demographics, personality, location, etc. There is a growing body of literature that focuses on the similarities and differences between how people behave in the offline world vs. how they behave in these virtual environments. Data mining has aided in discovering interesting insights with respect to how people behave in these virtual environments.
Internet --- Virtual reality --- Computer games --- Social aspects. --- Social sciences --- Computer Appl. in Social and Behavioral Sciences. --- Data-driven Science, Modeling and Theory Building. --- Methodology of the Social Sciences. --- Mathematics in the Humanities and Social Sciences. --- Data processing. --- Methodology. --- Application software. --- Sociophysics. --- Econophysics. --- Social sciences. --- Mathematics. --- Math --- Science --- Behavioral sciences --- Human sciences --- Sciences, Social --- Social science --- Social studies --- Civilization --- Economics --- Statistical physics --- Mathematical sociology --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Statistical methods
Choose an application
The 7th Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD) was held from April 30 to May 2, 2003 in the Convention and Exhibition Center (COEX), Seoul, Korea. The PAKDD conference is a major forum for academic researchers and industry practitioners in the Pacific Asia region to share original research results and development experiences from different KDD-related areas such as data mining, data warehousing, machine learning, databases, statistics, knowledge acquisition and discovery, data visualization, and knowledge-based systems. The conference was organized by the Advanced Information Technology Research Center (AITrc) at KAIST and the Statistical Research Center for Complex Systems (SRCCS) at Seoul National University. It was sponsored by the Korean Datamining Society (KDMS), the Korea Information Science Society (KISS), the United States Air Force Office of Scientific Research, the Asian Office of Aerospace Research & Development, and KAIST. It was held with cooperation from ACM’s Special Group on Knowledge Dis- very and Data Mining (SIGKDD).
Database management --- Database searching --- Data mining --- Computer Science --- Engineering & Applied Sciences --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Data structures (Computer science). --- Mathematical statistics. --- Database management. --- Information storage and retrieval. --- Artificial intelligence. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Artificial Intelligence (incl. Robotics). --- Probability and Statistics in Computer Science. --- Database Management. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Data structures (Computer scienc. --- Information storage and retrieva. --- Data Structures and Information Theory. --- Artificial Intelligence. --- Information storage and retrieval systems. --- Application software. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Mathematics --- Statistical inference --- Statistics, Mathematical --- Statistics --- Probabilities --- Sampling (Statistics) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Statistical methods --- Data structures (Computer science)
Choose an application
Modern society depends critically on computers that control and manage systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks, including viruses, worms, and intrusions, has turned this vulnerability into a clear and visible threat. Due to the escalating number and increased sophistication of cyber attacks, it has become important to develop a broad range of techniques, which can ensure that the information infrastructure continues to operate smoothly, even in the presence of dire and continuous threats. This book brings together the latest techniques for managing cyber threats, developed by some of the world's leading experts in the area. The book includes broad surveys on a number of topics, as well as specific techniques. It provides an excellent reference point for researchers and practitioners in the government, academic, and industrial communities who want to understand the issues and challenges in this area of growing worldwide importance. Audience This book is intended for members of the computer security research and development community interested in state-of-the-art techniques; personnel in federal organizations tasked with managing cyber threats and information leaks from computer systems; personnel at the military and intelligence agencies tasked with defensive and offensive information warfare; personnel in the commercial sector tasked with detection and prevention of fraud in their systems; and personnel running large-scale data centers, either for their organization or for others, tasked with ensuring the security, integrity, and availability of data.
Choose an application
The two-volume set LNAI 6634 and 6635 constitutes the refereed proceedings of the 15th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2011, held in Shenzhen, China in May 2011. The total of 32 revised full papers and 58 revised short papers were carefully reviewed and selected from 331 submissions. The papers present new ideas, original research results, and practical development experiences from all KDD-related areas including data mining, machine learning, artificial intelligence and pattern recognition, data warehousing and databases, statistics, knoweldge engineering, behavior sciences, visualization, and emerging areas such as social network analysis.
Complex analysis --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- IR (information retrieval) --- complexe analyse (wiskunde) --- data mining --- informatiesystemen --- database management --- KI (kunstmatige intelligentie) --- computernetwerken --- robots
Choose an application
The two-volume set LNAI 6634 and 6635 constitutes the refereed proceedings of the 15th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2011, held in Shenzhen, China in May 2011. The total of 32 revised full papers and 58 revised short papers were carefully reviewed and selected from 331 submissions. The papers present new ideas, original research results, and practical development experiences from all KDD-related areas including data mining, machine learning, artificial intelligence and pattern recognition, data warehousing and databases, statistics, knoweldge engineering, behavior sciences, visualization, and emerging areas such as social network analysis.
Complex analysis --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- IR (information retrieval) --- complexe analyse (wiskunde) --- data mining --- informatiesystemen --- database management --- KI (kunstmatige intelligentie) --- computernetwerken --- robots
Choose an application
Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- IR (information retrieval) --- informatica --- maatschappij --- informatiesystemen --- database management --- KI (kunstmatige intelligentie) --- computernetwerken --- robots --- AI (artificiële intelligentie)
Listing 1 - 10 of 27 | << page >> |
Sort by
|