pt. 1. Data mining and security -- pt. 2. Data mining for email worm detection -- pt. 3. Data mining for detecting malicious executables -- pt. 4. Data mining for detecting remote exploits -- pt. 5. Data mining for detecting botnets -- pt. 6. Stream mining for security applications -- pt. 7. Emerging applications.
Reproduction
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.