Louisiana Tech computer scientist pens first cyber data mining reference book

May 24, 2011
This is the cover of "Data Mining and Machine Learning in Cybersecurity," by Sumeet Dua and Xian Du. Credit: Sumeet Dua

Dr. Sumeet Dua, the Upchurch Endowed Professor of Computer Science and coordinator of information technology research at Louisiana Tech University, has co-authored the first reference book focusing on cyber data mining and machine learning.

"Data Mining and Machine Learning in ," which Dua authored with Dr. Xian Du, a senior research associate and postdoctoral fellow at Louisiana Tech, surveys cybersecurity problems and state-of-the-art machine-learning and data-mining solutions that address the overarching research problems. The book is designed for students and researchers studying or working on machine learning and data mining applications.

"'Data Mining and Machine Learning in Cybersecurity' is intended as a preliminary reference point for emerging researchers in this heavily interdisciplinary area," said Dua. "This book will provide them with an integrated, bottom-up view of the data-centered computational learning challenges in cybersecurity domains and help apportion this large problem into smaller underpinning data-mining and machine-learning research questions and their potential solutions."

Dua says numerous illustrative figures will help readers visualize the workflow of complex techniques, and more than forty case studies provide a clear proof-of-principle understanding of the design and application of data-mining and machine-learning techniques in cybersecurity.

According to the book's preface, in the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda, inviting interest from a multidisciplinary scientific workforce. Machine learning and data mining play significant roles in cybersecurity, especially as more challenges appear with the rapid development of information discovery techniques.

Several conferences, workshops, and journals have focused on this research topic, however until the publication of Dua's book, there had not been a single interdisciplinary resource on past and current works and possible paths for future research in this area.

Dua says the inclusion of cybersecurity design principles in machine-learning research is important for academic research. "Such an inclusion inspires fundamental research in and data mining, such as research in the subfields of imbalanced learning, feature extraction for data with evolving characteristics, and privacy-preserving data mining."

In addition to this first-of-its-kind reference publication, Dua has also co-authored or edited books on data mining in biomedical imaging and bioinformatics, and computational analysis.

Dua earned his Ph.D. from Louisiana State University in Baton Rouge and has received numerous research awards from the State and Louisiana Tech including the 2007 Research Recognition Award and the 2009 Inventor Recognition Award. He is frequently invited to serve as a scientific review panelist for a variety of federal agencies and is a senior member of IEEE and the Association for Computing Machinery (ACM).

Dua's areas of expertise include data mining, image processing and computational decision support, pattern recognition, data warehousing, biomedical informatics, and heterogeneous distributed data integration.

Explore further: Taking great ideas from the lab to the fab

Provided by Louisiana Tech University

not rated yet
add to favorites email to friend print save as pdf

Related Stories

Ames Researcher Makes Flying Safer

Apr 28, 2010

(PhysOrg.com) -- It's comforting to know that when you board a commercial airline Ames Researcher Ashok Srivastava is working to ensure that you enjoy a safe flight.

Researchers remotely unlock mysteries of water on Mars

Jul 31, 2006

A mission to Mars requires an estimated six-month voyage from Earth, but researchers at the University of Houston and the Lunar and Planetary Institute (LPI) have found a way to study its landscape without having to take ...

Data mining personnel

Apr 22, 2008

With the dark clouds of global recession now is the time for companies to make the most of their most valuable assets - their personnel. Writing in a forthcoming issue of the International Journal of Business Information Sy ...

Data miners dig for corrosion resistance

Apr 20, 2011

(PhysOrg.com) -- A better understanding of corrosion resistance may be possible using a data-mining tool, according to Penn State material scientists. This tool may also aid research in other areas where massive amounts of ...

Recommended for you

How to secure the cloud

9 hours ago

For many of us, the primary reason we use "the cloud" is for storage—whether it's storing email through services like Gmail and Yahoo!, photos on Flickr, or personal documents on Dropbox. Many organizations ...

Berkeley team explores sound for indoor localization

13 hours ago

The global positioning system, or GPS, has its limitations—namely, it cannot work indoors. Potential solutions for indoor positioning continue to fire up the imaginations of scientists. The latest news ...

Taking great ideas from the lab to the fab

Jul 31, 2014

A "valley of death" is well-known to entrepreneurs—the lull between government funding for research and industry support for prototypes and products. To confront this problem, in 2013 the National Science ...

User comments : 0