Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Florida Tech Evans Library Logo

CYB 5675 - Data Mining for Cybersecurity

Week 1 Readings

Frank Eibe, MA Hall, and IH Witten. The WEKA workbench.
online appendix for "Data Mining: Practical machine learning tools
and techniques". Morgan Kaufmann, 2016.

https://www.cs.waikato.ac.nz/ml/weka/book.html

 

Hansman, S., & Hunt, R. (2005) A taxonomy of network and computer attacks. Computers & Security, 24(1):31–43. 

https://www-sciencedirect-com.portal.lib.fit.edu/science/article/pii/S0167404804001804

 

Textbook

Data Mining Chapter 1

Week 2 Readings

Erhard Rahm and Hong Hai Do. Data cleaning: Problems and
current approaches. IEEE Data Eng. Bull., 23(4):3{13, 2000.

http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.98.8661

 

Textbooks

Data Mining Chapters 2 & 8

Network Security Chapter 1

 

Week 3 Readings

P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli. A detailed
investigation and analysis of using machine learning techniques for
intrusion detection. IEEE Communications Surveys Tutorials, pages
1-1, 2018.

https://ieeexplore-ieee-org.portal.lib.fit.edu/document/8386762

 

Textbook

Data Mining Chapters 4 & 6

Week 4 Reading

Textbook

Data Mining Chapter 5 and Appendix B.5

Week 5 Readings

Bhuyan, M. H., Bhattacharyya, D. K., and Kalita, J. K. (2017). Network Traffic Anomaly Detection Techniques and Systems, pages 115–169. Springer International Publishing, Cham. 

​​https://link-springer-com.portal.lib.fit.edu/book/10.1007%2F978-3-319-65188-0

 

Textbook

Data Mining Chapter 7 and 9.1-9.3

Week 6 Readings

Roberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto,
and Wenke Lee. McPAD:
A multiple classifier system for accurate
payload-based anomaly detection. Computer Networks, 53(6):864-
881, 2009.

https://www-sciencedirect-com.portal.lib.fit.edu/science/article/pii/S1389128608003927

 

Textbook

Data Mining Chapter 12

 

Week 7 Readings

Cynthia Dwork. The promise of differential privacy. a tutorial on
algorithmic techniques. In 52nd Annual IEEE Symposium on Foun-
dations of Computer Science, October 2011.

https://ieeexplore-ieee-org.portal.lib.fit.edu/document/6108143

 

R. Mendes and J. P. Vilela. Privacy-preserving data mining: Meth-
ods, metrics, and applications. IEEE Access, 5:10562{10582, 2017.

https://ieeexplore-ieee-org.portal.lib.fit.edu/document/7950921

 

 

Week 8 Reading

Faheem Ullah and M. Ali Babar. Architectural tactics for big data
cybersecurity analytic systems: A review, 2018.

https://arxiv.org/abs/1802.03178

 

 

Textbook

Data Mining Chapter 13.1-13.3