{"id":469,"date":"2023-06-07T09:57:33","date_gmt":"2023-06-07T02:57:33","guid":{"rendered":"https:\/\/wsc.idu.ac.id\/?p=469"},"modified":"2023-09-08T14:25:05","modified_gmt":"2023-09-08T07:25:05","slug":"data-analysis-for-network-cyber-security","status":"publish","type":"post","link":"https:\/\/wsc.idu.ac.id\/index.php\/2023\/06\/07\/data-analysis-for-network-cyber-security\/","title":{"rendered":"Data Analysis For Network Cyber-Security"},"content":{"rendered":"<p>The contents of this volume are contributions from invited speakers at a workshop entitled \u201cData Analysis for Cyber-Security\u201d, hosted by the Universityof Bristol in March2013.We aregrateful for the generous support of the Heilbronn Institute for Mathematical Research, an academic research unit of the Universisty of Bristol with interests related to cyber-security. Cyber-security \u2013 the task of defending computers and people from electronic attack \u2013 is a pressing concern. For example, a report sponsored by the UK government in 2012 estimated the cost of cyber-attack to the UK economy as \u00a329 billion. This cost is attributed to various types of attack, including extortion, \ufb01scal fraud and identity theft. Notably, the largest category,intellectualpropertytheft, accountedfor around\u00a39billion. Thescale of cyber-attack provoked the UK government to highlight cyber-security as a top priority for national security in 2013. From a UK point of view, based on recent \ufb01gures, the problem is increasing: 78% of large organisations were subject to external attack in 2012, up from 73% in the previous year, while 63% of small business were subject to such attack over the same period, an increase of 41% on the previous year. Cyber-security is a broad discipline, covering a range of academic disciplines including computer science, computer and network architecture, and statistics. This volume is concerned with network cyber-security, and particularly, analysis of data that are observed in relation to a network of either computers or people. As an exemplar, consider an institutional computer network, in which communicating devices (computers, printers, etc.) are nodes and communications between devices are events that occur on edges between nodes. Numerous types of cyber-attack have been observed in this context. A variety of such attacks are well described in Davido\ufb00 and Ham (2012) from the point of view of network forensics. <\/p>\n<p><a href=\"https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/Data-Analysis-For-Network-Cyber-Security.pdf\">Data Analysis For Network Cyber-Security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The contents of this volume are contributions from invited speakers at a workshop entitled \u201cData Analysis for Cyber-Security\u201d,<\/p>\n","protected":false},"author":1,"featured_media":471,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[],"class_list":["post-469","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-buku-referensi-wsc-2022"],"featured_image_urls":{"full":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/Data-Analytics.png",507,763,false],"thumbnail":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/Data-Analytics.png",100,150,false],"medium":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/Data-Analytics.png",199,300,false],"medium_large":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/Data-Analytics.png",507,763,false],"large":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/Data-Analytics.png",507,763,false],"1536x1536":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/Data-Analytics.png",507,763,false],"2048x2048":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/Data-Analytics.png",507,763,false],"darknews-slider-full":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/Data-Analytics.png",478,720,false],"darknews-featured":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/Data-Analytics.png",507,763,false],"darknews-medium":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/Data-Analytics.png",352,530,false],"darknews-medium-square":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/Data-Analytics.png",233,350,false]},"author_info":{"display_name":"wsc","author_link":"https:\/\/wsc.idu.ac.id\/index.php\/author\/wsc\/"},"category_info":"<a href=\"https:\/\/wsc.idu.ac.id\/index.php\/category\/buku-referensi-wsc-2022\/\" rel=\"category tag\">Buku Referensi WSC 2022<\/a>","tag_info":"Buku Referensi WSC 2022","comment_count":"0","_links":{"self":[{"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/posts\/469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/comments?post=469"}],"version-history":[{"count":2,"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/posts\/469\/revisions"}],"predecessor-version":[{"id":473,"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/posts\/469\/revisions\/473"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/media\/471"}],"wp:attachment":[{"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/media?parent=469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/categories?post=469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/tags?post=469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}