书目详情:
Front MatterChapter 1. IntroductionSection I. Data Mining and SecurityChapter 2. Data Mining TechniquesChapter 3. MalwareChapter 4. Data Mining for Security ApplicationsChapter 5. Design and Implementation of Data Mining ToolsConclusion to Part ISection II. Data Mining for Email Worm DetectionChapter 6. Email Worm DetectionChapter 7. Design of the Data Mining ToolChapter 8. Evaluation and ResultsConclusion to Part IISection III. Data Mining for Detecting Malicious ExecutablesChapter 9. Malicious ExecutablesChapter 10. Design of the Data Mining ToolChapter 11. Evaluation and ResultsConclusion to Part IIISection IV. Data Mining for Detecting Remote ExploitsChapter 12. Detecting Remote ExploitsChapter 13. Design of the Data Mining ToolChapter 14. Evaluation and ResultsConclusion to Part IVSection V. Data Mining for Detecting BotnetsChapter 15. Detecting BotnetsChapter 16. Design of the Data Mining ToolChapter 17. Evaluation and ResultsConclusion to Part VSection VI. Stream Mining for Security ApplicationsChapter 18. Stream MiningChapter 19. Design of the Data Mining ToolChapter 20. Evaluation and ResultsConclusion for Part VISection VII. Emerging ApplicationsChapter 21. Data Mining for Active DefenseChapter 22. Data Mining for Insider Threat DetectionChapter 23. Dependable Real-Time Data MiningChapter 24. Firewall Policy AnalysisConclusion to Part VIIChapter 25. Summary and DirectionsAppendix AAppendix BAppendix CAppendix DIndex
评论:

