Data mining tools for malware detection / Mehedy Masud, Latifur Khan, and Bhavani Thuraisingham.

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown...

Full description

Saved in:
Bibliographic Details
Main Author: Masud, Mehedy
Other Authors: Khan, Latifur, Thuraisingham, Bhavani M.
Format: eBook
Language:English
Published: Boca Raton, FL : CRC Press, ©2012.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 a 4500
001 ocn772458526
003 OCoLC
005 20240809213013.0
006 m o d
007 cr cnu---unuuu
008 120111s2012 flua ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d E7B  |d UV0  |d OTZ  |d CDX  |d OCLCO  |d EBLCP  |d OCLCQ  |d OCLCF  |d DEBSZ  |d OCLCQ  |d CRCPR  |d OCLCQ  |d Z5A  |d IDB  |d LIV  |d MERUC  |d UAB  |d STF  |d OCLCA  |d OCLCQ  |d CEF  |d NLE  |d COO  |d OCLCQ  |d UKMGB  |d WYU  |d YOU  |d YDX  |d TYFRS  |d LEAUB  |d OCLCQ  |d UKAHL  |d LOA  |d UX1  |d OCLCQ  |d U3W  |d LVT  |d VT2  |d BRF  |d OCLCQ  |d OCLCO  |d AAA  |d OCLCO  |d OCLCQ  |d INARC  |d SFB  |d OCLCQ  |d OCLCO  |d OCLCL 
015 |a GBB7A1024  |2 bnb 
016 7 |a 018372766  |2 Uk 
019 |a 809977300  |a 961642367  |a 1015205392  |a 1066049491  |a 1087354554  |a 1122513229  |a 1124223067  |a 1127929285  |a 1135530933  |a 1152828672  |a 1156405107  |a 1181902440  |a 1228576242  |a 1240510469 
020 |a 9781439854556  |q (electronic bk.) 
020 |a 1439854556  |q (electronic bk.) 
020 |z 9781439854549 
020 |z 1439854548 
024 8 |a 9786613908773 
035 |a (OCoLC)772458526  |z (OCoLC)809977300  |z (OCoLC)961642367  |z (OCoLC)1015205392  |z (OCoLC)1066049491  |z (OCoLC)1087354554  |z (OCoLC)1122513229  |z (OCoLC)1124223067  |z (OCoLC)1127929285  |z (OCoLC)1135530933  |z (OCoLC)1152828672  |z (OCoLC)1156405107  |z (OCoLC)1181902440  |z (OCoLC)1228576242  |z (OCoLC)1240510469 
037 |a 390877  |b MIL 
050 4 |a QA76.9.D343  |b M385 2012eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
049 |a HCDD 
100 1 |a Masud, Mehedy. 
245 1 0 |a Data mining tools for malware detection /  |c Mehedy Masud, Latifur Khan, and Bhavani Thuraisingham. 
260 |a Boca Raton, FL :  |b CRC Press,  |c ©2012. 
300 |a 1 online resource (xxx, 419 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
500 |a "An Auerbach book." 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a pt. 1. Data mining and security -- pt. 2. Data mining for email worm detection -- pt. 3. Data mining for detecting malicious executables -- pt. 4. Data mining for detecting remote exploits -- pt. 5. Data mining for detecting botnets -- pt. 6. Stream mining for security applications -- pt. 7. Emerging applications. 
520 |a Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets. The authors describe the systems they have designed and devel. 
650 0 |a Data mining. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data mining  |2 fast 
700 1 |a Khan, Latifur. 
700 1 |a Thuraisingham, Bhavani M. 
758 |i has work:  |a Data mining tools for malware detection (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGRfVwwCcMHvCdGXrYYhXm  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Masud, Mehedy.  |t Data mining tools for malware detection.  |d Boca Raton, FL : CRC Press, ©2012  |z 9781439854549  |w (DLC) 2011039383  |w (OCoLC)757935662 
856 4 0 |u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=826949  |y Click for online access 
903 |a EBC-AC 
994 |a 92  |b HCD