Cybersecurity and Data Science

Download Url(s)
https://mdpi.com/books/pdfview/book/7034Contributor(s)
Szczypiorski, Krzysztof (editor)
Language
EnglishAbstract
The reprint focuses on the latest research in cybersecurity and data science. Digital transformation turns data into the new oil, so the increasing availability of big data, structured and unstructured datasets, raises new challenges in cybersecurity, efficient data processing and knowledge extraction. The field of cybersecurity and data science fuels the data-driven economy. Innovations in this field require strong foundations in mathematics, statistics, machine learning and information security. The unprecedented increase in the availability of data in many fields of science and technology (e.g., genomic data, data from industrial environments, network traffic, streaming media, sensory data of smart cities, and social network data) ask for new methods and solutions for data processing, information extraction and decision support. This stimulates the development of new methods of data analysis, including those adapted to the analysis of new data structures and the growing volume of data. The papers included in this reprint discuss various topics ranging from cyberattacks, steganography, anomaly detection, evaluation of the attacker skills, modelling of the threats, and wireless security evaluation, as well as artificial intelligence, machine learning, and deep learning. Given this diversity of topics the book represents a valuable reference for researchers in cybersecurity security and data science.
Keywords
steganography; network security; steganography detection; steganalysis; machine learning; big data; IoT; pattern mining; wireless communications; covert channel; dirty constellation; wireless postmodulation steganography; phase drift; drift correction modulation; undetectability; security; quadrature amplitude modulation; spam; phishing; classification; augmented dataset; multi-language emails; cybersecurity; data protection; SoC; threat agents; motivation; opportunity; capability; user profiling; implicit; modeling; real-time user monitoring; complexity threat agent; threat assessment; network traffic analysis; convolutional neural networks; network traffic images; visualization of traffic; classifiers; e-mail; ham; data science; datasets; cyber threats modeling; multi-agent systems; cyber deception; pseudorandom sequences generators; prime numbers; additive Fibonacci generator; statistical characteristics; android device; BrainShield; hybrid model; malware detection; Omnidroid; image processing; BOSS database; ensemble classifier; deep learning; stegomalware; traffic analysis; network probe; hash function; SHA-3; FPGA; cognitive security; cyberattacks; game software; threat matrix computing; evaluation function; data modeling; authentication; bit template; information-processing electronic device; Poisson pulse sequences generators; n/aWebshop link
https://mdpi.com/books/pdfview ...ISBN
9783036569062, 9783036569079Publisher website
www.mdpi.com/booksPublication date and place
Basel, 2023Classification
Information technology industries