Louisiana Tech computer scientist pens first cyber data mining reference book

May 24, 2011
This is the cover of "Data Mining and Machine Learning in Cybersecurity," by Sumeet Dua and Xian Du. Credit: Sumeet Dua

Dr. Sumeet Dua, the Upchurch Endowed Professor of Computer Science and coordinator of information technology research at Louisiana Tech University, has co-authored the first reference book focusing on cyber data mining and machine learning.

"Data Mining and Machine Learning in ," which Dua authored with Dr. Xian Du, a senior research associate and postdoctoral fellow at Louisiana Tech, surveys cybersecurity problems and state-of-the-art machine-learning and data-mining solutions that address the overarching research problems. The book is designed for students and researchers studying or working on machine learning and data mining applications.

"'Data Mining and Machine Learning in Cybersecurity' is intended as a preliminary reference point for emerging researchers in this heavily interdisciplinary area," said Dua. "This book will provide them with an integrated, bottom-up view of the data-centered computational learning challenges in cybersecurity domains and help apportion this large problem into smaller underpinning data-mining and machine-learning research questions and their potential solutions."

Dua says numerous illustrative figures will help readers visualize the workflow of complex techniques, and more than forty case studies provide a clear proof-of-principle understanding of the design and application of data-mining and machine-learning techniques in cybersecurity.

According to the book's preface, in the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda, inviting interest from a multidisciplinary scientific workforce. Machine learning and data mining play significant roles in cybersecurity, especially as more challenges appear with the rapid development of information discovery techniques.

Several conferences, workshops, and journals have focused on this research topic, however until the publication of Dua's book, there had not been a single interdisciplinary resource on past and current works and possible paths for future research in this area.

Dua says the inclusion of cybersecurity design principles in machine-learning research is important for academic research. "Such an inclusion inspires fundamental research in and data mining, such as research in the subfields of imbalanced learning, feature extraction for data with evolving characteristics, and privacy-preserving data mining."

In addition to this first-of-its-kind reference publication, Dua has also co-authored or edited books on data mining in biomedical imaging and bioinformatics, and computational analysis.

Dua earned his Ph.D. from Louisiana State University in Baton Rouge and has received numerous research awards from the State and Louisiana Tech including the 2007 Research Recognition Award and the 2009 Inventor Recognition Award. He is frequently invited to serve as a scientific review panelist for a variety of federal agencies and is a senior member of IEEE and the Association for Computing Machinery (ACM).

Dua's areas of expertise include data mining, image processing and computational decision support, pattern recognition, data warehousing, biomedical informatics, and heterogeneous distributed data integration.

Explore further: Forging a photo is easy, but how do you spot a fake?

Provided by Louisiana Tech University

not rated yet
add to favorites email to friend print save as pdf

Related Stories

Ames Researcher Makes Flying Safer

Apr 28, 2010

(PhysOrg.com) -- It's comforting to know that when you board a commercial airline Ames Researcher Ashok Srivastava is working to ensure that you enjoy a safe flight.

Researchers remotely unlock mysteries of water on Mars

Jul 31, 2006

A mission to Mars requires an estimated six-month voyage from Earth, but researchers at the University of Houston and the Lunar and Planetary Institute (LPI) have found a way to study its landscape without having to take ...

Data mining personnel

Apr 22, 2008

With the dark clouds of global recession now is the time for companies to make the most of their most valuable assets - their personnel. Writing in a forthcoming issue of the International Journal of Business Information Sy ...

Data miners dig for corrosion resistance

Apr 20, 2011

(PhysOrg.com) -- A better understanding of corrosion resistance may be possible using a data-mining tool, according to Penn State material scientists. This tool may also aid research in other areas where massive amounts of ...

Recommended for you

Forging a photo is easy, but how do you spot a fake?

12 hours ago

Faking photographs is not a new phenomenon. The Cottingley Fairies seemed convincing to some in 1917, just as the images recently broadcast on Russian television, purporting to be satellite images showin ...

Algorithm, not live committee, performs author ranking

16 hours ago

Thousands of authors' works enter the public domain each year, but only a small number of them end up being widely available. So how to choose the ones taking center-stage? And how well can a machine-learning ...

Professor proposes alternative to 'Turing Test'

Nov 19, 2014

(Phys.org) —A Georgia Tech professor is offering an alternative to the celebrated "Turing Test" to determine whether a machine or computer program exhibits human-level intelligence. The Turing Test - originally ...

Image descriptions from computers show gains

Nov 18, 2014

"Man in black shirt is playing guitar." "Man in blue wetsuit is surfing on wave." "Black and white dog jumps over bar." The picture captions were not written by humans but through software capable of accurately ...

Converting data into knowledge

Nov 17, 2014

When a movie-streaming service recommends a new film you might like, sometimes that recommendation becomes a new favorite; other times, the computer's suggestion really misses the mark. Yisong Yue, assistant ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.