The power of big data in cybersecurity -- Big data analytics for network forensics -- Dynamic analytics-driven assessment of vulnerabilities and exploitation -- Big data analytics for mobile app security -- Machine unlearning: repairing learning models in adversarial -- Environments -- Cybersecurity training -- Machine unlearning: repairing learning models in adversarial environments -- Big data analytics for mobile app security -- Security, privacy and trust in cloud computing: challenges and solutions -- Cybersecurity in internet of things (IOT) -- Data visualization for cyber security -- Analyzing deviant socio-technical behaviors using social network analysis and cyber forensics-based methodologies -- Security tools -- Data and research initiatives for cybersecurity analysis.
0
TOPICAL NAME USED AS SUBJECT
Entry Element
Computer security.
Entry Element
Big data.
Entry Element
Database security.
Entry Element
Computer networks
Entry Element
Information technology
Topical Subdivision
Security measures.
Topical Subdivision
Management.
DEWEY DECIMAL CLASSIFICATION
Edition
23
LIBRARY OF CONGRESS CLASSIFICATION
Class number
QA76
.
9
Book number
.
A25
B538
2017
PERSONAL NAME - SECONDARY RESPONSIBILITY
Entry Element
Savas, Onur,
Entry Element
Deng, Julia,
ORIGINATING SOURCE
Country
ایران
Agency
University of Tehran. Library of College of Science