Data Analytics and Decision Support for Cybersecurity

Trends, Methodologies and Applications

  • Iván Palomares Carrascosa
  • Harsha Kumara Kalutarage
  • Yan Huang

Part of the Data Analytics book series (DAANA)

Table of contents

  1. Front Matter
    Pages i-xvi
  2. Regular Chapters

    1. Front Matter
      Pages 1-1
    2. Markus Ring, Sarah Wunderlich, Dominik Grüdl, Dieter Landes, Andreas Hotho
      Pages 3-31
    3. Irina Măriuca Asăvoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen et al.
      Pages 55-97
    4. Domhnall Carlin, Philip O’Kane, Sakir Sezer
      Pages 99-125
    5. Yousef W. Sabbah
      Pages 157-200
  3. Invited Chapters

About this book


The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks. The recent advent of Big Data paradigms and the use of data science methods, has resulted in a higher demand for effective data-driven models that support decision-making at a strategic level. This motivates the need for defining novel data analytics and decision support approaches in a myriad of real-life scenarios and problems, with Cybersecurity-related domains being no exception.

 This contributed volume comprises nine chapters, written by leading international researchers, covering a compilation of recent advances in Cybersecurity-related applications of data analytics and decision support approaches. In addition to theoretical studies and overviews of existing relevant literature, this book comprises a selection of application-oriented research contributions. The investigations undertaken across these chapters focus on diverse and critical Cybersecurity problems, such as Intrusion Detection, Insider Threats, Insider Threats, Collusion Detection, Run-Time Malware Detection, Intrusion Detection, E-Learning, Online Examinations, Cybersecurity noisy data removal, Secure Smart Power Systems, Security Visualization and Monitoring.

Researchers and professionals alike will find the chapters an essential read for further research on the topic.


Risk assessment approaches to cybersecurity Network traffic analysis Network attack monitoring Insider threat management Collusion conspiracy Social network security

Editors and affiliations

  • Iván Palomares Carrascosa
    • 1
  • Harsha Kumara Kalutarage
    • 2
  • Yan Huang
    • 3
  1. 1.University of BristolBristolUnited Kingdom
  2. 2.Centre for Secure Information TechnologiesQueen’s University of BelfastBelfastUnited Kingdom
  3. 3.Queen’s University BelfastBelfastUnited Kingdom

Bibliographic information