Search Results - novel sequence
Suggested Topics within your search.
Suggested Topics within your search.
- Feature films 2
- Big data 1
- Computer crimes 1
- Computer networks 1
- Computer security 1
- Crusades 1
- Data processing 1
- Economic aspects 1
- Energy conservation 1
- Films for the hearing impaired 1
- Historical films 1
- History 1
- Malware (Computer software) 1
- Napoleonic Wars, 1800-1815 1
- Navies 1
- Officers 1
- Sewage disposal plants 1
- Technological innovations 1
- Video recordings for the hearing impaired 1
- War films 1
- access control 1
- investigation 1
-
1
-
2
Big data analytics with applications in insider threat detection
Published 2018Table of Contents: “…Introduction -- Data security and privacy -- Data mining techniques -- Data mining for security applications -- Cloud computing and semantic web technologies -- Data mining and insider threat detection -- Big data management and analytics technologies -- Challenges for stream data classification -- Survey of stream data classification -- A multi-partition, multi-chunk ensemble for classifying concept-drifting data streams -- Classification and novel class detection in concept-drifting data streams -- Data stream classification with limited labeled training data -- Directions in data stream classification -- Insider threat detection as a stream mining problem -- Survey of insider threat and stream mining -- Ensemble-based insider threat detection -- Details of learning classes -- Experiments and results for nonsequence data -- Insider threat detection for sequence data -- Experiments and results for sequence data -- Scalability using big data technologies -- Stream mining and big data for insider threat detection -- Cloud query processing system for big data management -- Big data analytics for multipurpose social media applications -- Big data management and cloud for assured information sharing -- Big data management for secure information integration -- Big data analytics for malware detection -- A semantic web-based inference controller for provenance big data -- Confidentiality, privacy, and trust for big data systems -- Unified framework for secure big data management and analytics -- Big data, security, and the internet of things -- Big data analytics for malware detection in smartphones -- Toward a case study in healthcare for big data analytics and security -- Toward an experimental infrastructure and education program for BDMA and BDSP -- Directions for BDSP and BDMA -- Summary and directions…”
Book -
3
-
4
-
5


