Get Free Shipping on orders over $89
Terrorism, Security, and Computation : Terrorism, Security, and Computation - Chilukuri K. Mohan

Terrorism, Security, and Computation

By: Chilukuri K. Mohan, Kishan G. Mehrotra, HuaMing Huang

Hardcover | 25 January 2018

At a Glance

Hardcover


RRP $219.00

$178.75

18%OFF

or 4 interest-free payments of $44.69 with

 or 

Ships in 10 to 15 business days

This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and weaknesses.

The authors also cover algorithms that address different kinds of problems of interest with single and multiple time series data and multi-dimensional data. New ensemble anomaly detection algorithms are  described, utilizing the benefits provided by diverse algorithms, each of which work well on some kinds of data.

 With advancements in technology and the extensive use of the internet as a medium for communications and commerce, there has been a tremendous increase in the threats faced by individuals and organizations from attackers and criminal entities. Variations in the observable behaviors of individuals (from others and from their own past behaviors) have been found to be useful in predicting potential problems of various kinds. Hence computer scientists and statisticians have been conducting research on automatically identifying anomalies in large datasets.

 This book will primarily target practitioners and researchers who are newcomers to the area of modern anomaly detection techniques. Advanced-level students in computer science will also find this book helpful with their studies.

Industry Reviews

"This book presents the interesting topic of anomaly detection for a very broad audience. ... The presentation is really useful: for each technique, some motivation is given, including real-life situations, a comprehensible formalization, and pros and cons, which gives readers an idea of how useful the technique will be in practice. ... Probably the most important contribution of the book is its citations and references for further reading, which may help casual readers better understand each technique ... ." (Santiago Escobar, Computing Reviews, January, 2019)



â

Other Editions and Formats

Paperback

Published: 6th June 2019

More in Network Security

Careless People : A story of where I used to work - Sarah Wynn-Williams

RRP $24.99

$21.75

13%
OFF
Grey Area : Dark Web Data Collection and the Future of OSINT - Vinny Troia
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Hacking For Dummies : For Dummies (Computer/Tech) - Kevin Beaver

RRP $49.95

$36.75

26%
OFF
Tech-Smart Parenting : How to keep your kids happy and safe online - Catherine Knibbs
Networking All-in-One For Dummies : For Dummies (Computer/Tech) - Doug Lowe
CompTIA Security+ Certification Kit : 7th Edition - Exam SY0-701 - David  Seidl
Blue Team Handbook : Incident Response - Don Murdoch

RRP $60.99

$48.79

20%
OFF