Big Data Analytics with Applications in Insider Threat Detection /
Includes bibliographical and references
Main Authors: | , , , |
---|---|
Format: | |
Language: | eng |
Published: |
Boca Raton : CRC Press,
2018
|
Subjects: |
_version_ | 1826467996693954560 |
---|---|
author | Thuraisingham, Bhavani M., author Parveen, Pallabi author Mohammad Mahedy Masud author Khan, Latifur author |
author_facet | Thuraisingham, Bhavani M., author Parveen, Pallabi author Mohammad Mahedy Masud author Khan, Latifur author |
author_sort | Thuraisingham, Bhavani M., author |
collection | OCEAN |
description | Includes bibliographical and references |
first_indexed | 2024-03-05T16:11:55Z |
format | |
id | KOHA-OAI-TEST:553549 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T16:11:55Z |
publishDate | 2018 |
publisher | Boca Raton : CRC Press, |
record_format | dspace |
spelling | KOHA-OAI-TEST:5535492020-12-19T17:20:55ZBig Data Analytics with Applications in Insider Threat Detection / Thuraisingham, Bhavani M., author Parveen, Pallabi author Mohammad Mahedy Masud author Khan, Latifur author Boca Raton : CRC Press,2018♭2018engIncludes bibliographical and referencesFTIR Computer securityMalware (Computer software)Big data Computer crimes Computer networksURN:ISBN:9781498705479 |
spellingShingle | Computer security Malware (Computer software) Big data Computer crimes Computer networks Thuraisingham, Bhavani M., author Parveen, Pallabi author Mohammad Mahedy Masud author Khan, Latifur author Big Data Analytics with Applications in Insider Threat Detection / |
title | Big Data Analytics with Applications in Insider Threat Detection / |
title_full | Big Data Analytics with Applications in Insider Threat Detection / |
title_fullStr | Big Data Analytics with Applications in Insider Threat Detection / |
title_full_unstemmed | Big Data Analytics with Applications in Insider Threat Detection / |
title_short | Big Data Analytics with Applications in Insider Threat Detection / |
title_sort | big data analytics with applications in insider threat detection |
topic | Computer security Malware (Computer software) Big data Computer crimes Computer networks |
work_keys_str_mv | AT thuraisinghambhavanimauthor bigdataanalyticswithapplicationsininsiderthreatdetection AT parveenpallabiauthor bigdataanalyticswithapplicationsininsiderthreatdetection AT mohammadmahedymasudauthor bigdataanalyticswithapplicationsininsiderthreatdetection AT khanlatifurauthor bigdataanalyticswithapplicationsininsiderthreatdetection |