Big Data Analytics with Applications in Insider Threat Detection /

Includes bibliographical and references

Bibliographic Details
Main Authors: Thuraisingham, Bhavani M., author, Parveen, Pallabi author, Mohammad Mahedy Masud author, Khan, Latifur author
Format:
Language:eng
Published: Boca Raton : CRC Press, 2018
Subjects:
_version_ 1826467996693954560
author Thuraisingham, Bhavani M., author
Parveen, Pallabi author
Mohammad Mahedy Masud author
Khan, Latifur author
author_facet Thuraisingham, Bhavani M., author
Parveen, Pallabi author
Mohammad Mahedy Masud author
Khan, Latifur author
author_sort Thuraisingham, Bhavani M., author
collection OCEAN
description Includes bibliographical and references
first_indexed 2024-03-05T16:11:55Z
format
id KOHA-OAI-TEST:553549
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T16:11:55Z
publishDate 2018
publisher Boca Raton : CRC Press,
record_format dspace
spelling KOHA-OAI-TEST:5535492020-12-19T17:20:55ZBig Data Analytics with Applications in Insider Threat Detection / Thuraisingham, Bhavani M., author Parveen, Pallabi author Mohammad Mahedy Masud author Khan, Latifur author Boca Raton : CRC Press,2018♭2018engIncludes bibliographical and referencesFTIR Computer securityMalware (Computer software)Big data Computer crimes Computer networksURN:ISBN:9781498705479
spellingShingle Computer security
Malware (Computer software)
Big data
Computer crimes
Computer networks
Thuraisingham, Bhavani M., author
Parveen, Pallabi author
Mohammad Mahedy Masud author
Khan, Latifur author
Big Data Analytics with Applications in Insider Threat Detection /
title Big Data Analytics with Applications in Insider Threat Detection /
title_full Big Data Analytics with Applications in Insider Threat Detection /
title_fullStr Big Data Analytics with Applications in Insider Threat Detection /
title_full_unstemmed Big Data Analytics with Applications in Insider Threat Detection /
title_short Big Data Analytics with Applications in Insider Threat Detection /
title_sort big data analytics with applications in insider threat detection
topic Computer security
Malware (Computer software)
Big data
Computer crimes
Computer networks
work_keys_str_mv AT thuraisinghambhavanimauthor bigdataanalyticswithapplicationsininsiderthreatdetection
AT parveenpallabiauthor bigdataanalyticswithapplicationsininsiderthreatdetection
AT mohammadmahedymasudauthor bigdataanalyticswithapplicationsininsiderthreatdetection
AT khanlatifurauthor bigdataanalyticswithapplicationsininsiderthreatdetection