08075oam 2200745 a 450 991096252130332120200520144314.0979-84-00-63650-91-280-37386-597866103738640-313-01619-410.5040/9798400636509(CKB)111087026965102(OCoLC)614602171(CaPaEBR)ebrary10005662(SSID)ssj0000134306(PQKBManifestationID)11134111(PQKBTitleCode)TC0000134306(PQKBWorkID)10056441(PQKB)11752631(Au-PeEL)EBL3000517(CaPaEBR)ebr10005662(OCoLC)847167752(OCoLC)1034908783(DLC)BP9798400636509BC(Perlego)4202649(MiAaPQ)EBC3000517(EXLCZ)9911108702696510220010614e20012024 uy 0engurcn|||||||||txtccrCyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /Anthony H. Cordesman with Justin G. Cordesman1st ed.Westport, Conn. :Praeger,2001.London :Bloomsbury Publishing,20241 online resource (192 p.) "Published in cooperation with the Center for Strategic and International Studies, Washington, D.C."0-275-97423-5 Includes bibliographical references.Cover -- Cyber-threats, Information Warfare, and Critical Infrastructure Protection -- Contents -- Acknowledgments -- Chapter 1 The Changing Nature of Critical Infrastructure Protection -- THE PROBLEM OF EVOLVING TECHNOLOGY -- THE UNCERTAIN BALANCE OF RISKS AND NON-RISKS IN CYBER-ATTACKS -- The Disconnect between Cyber-defense and Cyber-offense -- The Lack of Credible Risk and Vulnerability Assessments -- GOVERNMENTAL AND PRIVATE SECTOR EFFORTS TO RESPOND -- Chapter 2 Threat Assessment -- THE PRESIDENT'S COMMISSION ON CRITICAL INFRASTRUCTURE PROTECTION CHARACTERIZATION OF THE THREAT -- THE NATIONAL INFRASTRUCTURE PROTECTION CENTER'S (NIPC) VIEW OF THE THREAT -- INTELLIGENCE COMMUNITY ASSESSMENTS OF THE THREAT -- CIA Testimony on the Threat -- National Intelligence Council's Estimate of the Threat -- Incidents of "Cyber-warfare": The Kosovo Crisis -- Serbia's Role in Information Warfare -- NATO's Role in Information Warfare -- Is Information Warfare and Retaliation Legal and Worth Its Costs? -- Lower-Level Incidents of "Cyber-warfare" -- Moonlight Maze -- Solar Sunrise -- Rome Labs Incident -- THE COMPUTER SECURITY INSTITUTE'S SURVEY OF THE THREAT -- COMPUTER EMERGENCY RESPONSE TEAM'S (CERT) ASSESSMENT OF THREAT -- CHALLENGES IN IMPROVING THE ASSESSMENT OF THE THREAT -- Chapter 3 Evolving U.S. Policy and Response -- THE BEGINNINGS: THE COMPUTER SECURITY ACT AND CLINGER-COHEN ACT -- THE FEDERAL GOVERNMENT REDEFINES CRITICAL INFRASTRUCTURE AND AGENCY RESPONSIBILITIES -- Executive Order 13010 -- The President's Commission on Critical Infrastructure Protection -- Presidential Decision Directive-63 (PDD-63) -- Lead Agencies for Sector Liaison -- Lead Agencies for Special Functions -- A New Structure for Interagency Coordination -- National Infrastructure Protection Center (NIPC) -- Information Sharing and Analysis Center (ISAC).National Infrastructure Assurance Council -- National Infrastructure Assurance Plan -- Studies and Research -- Cooperation with the Private and Civil Sectors -- Annual Report on Implementation -- NATIONAL PLAN FOR INFORMATION SYSTEMS PROTECTION -- National Plan for Information Systems Protection, Version One -- GAO Comments on the National Plan for Information Systems Protection -- Oplan 3600 -- THE SUCCESS OF THE FEDERAL GOVERNMENT EFFORT TO DATE -- Chapter 4 Analyzing Federal Critical Infrastructure Programs by Department and Agency -- THE NATIONAL PLAN FOR INFORMATION SYSTEMS ESTIMATE -- THE OMB ANALYSIS -- ANNUAL REPORT TO CONGRESS ON COMBATING TERRORISM -- Government-wide Spending on CIP -- EFFORTS BY FEDERAL AGENCIES -- Department of Agriculture -- Department of Commerce -- Critical Infrastructure Assurance Office -- Department of Energy -- Environmental Protection Agency and GAO Audits -- Health and Human Services -- Department of Interior -- Department of Justice -- NASA -- GAO Assessments of NASA Information Security -- NATIONAL SCIENCE FOUNDATION -- NATIONAL SECURITY COMMUNITY -- The Role of the Department of Defense -- Patterns of Attack and Response -- Major DoD Cyber-defense Programs -- GAO Critiques of DoD Efforts: The 1996 Study -- The GAO's 1999 Recommendations -- DoD Progress in Addressing Security Weaknesses -- Cyber and Information Warfare and the Role of the Intelligence Community -- Total Spending on National Security Activity -- Department of State -- Department of Transportation -- Department of Treasury -- Department of Veterans Affairs -- Chapter 5 Assessments of Effectiveness -- INDEPENDENT U.S. GOVERNMENT EFFORTS TO ASSESS RISK, COST, AND BENEFITS: GAO TESTIMONY OF OCTOBER 6, 1999 -- Management Recommendations Within Brock's Testimony.INDEPENDENT U.S. GOVERNMENT EFFORTS TO ASSESS RISK, COST, AND BENEFITS: GAO TESTIMONY OF MARCH 29, 2000 -- Weaknesses in Controls -- Raise Awareness -- Implement Software Patches -- Routinely Use Automated Tools to Monitor Security -- Identify and Propagate Pockets of Excellence -- Focus on the Most Common Vulnerabilities First -- Enforce a Strong Management Approach -- PRELIMINARY ANALYSIS OF GAO FINDINGS -- OTHER EFFORTS TO ASSESS RISK, COST, AND BENEFITS -- TECHNICAL RISKS, TESTS, AND EVALUATIONS OF IW PROGRAMS -- Chapter 6 Role of State and Local Governments -- Chapter 7 Role of Private Industry -- Chapter 8 Lessons from Other Nations: International Vulnerability -- Chapter 9 Conclusions and Recommendations -- Notes -- About the Authors.During the last two decades, the infrastructure of the U.S. economy has undergone a fundamental set of changes. It has steadily increased its reliance on its service sector and high-technology economy. The U.S. has come to depend on computers, electronic data storage and transfers, and highly integrated communications networks. The result is the rapid development of a new form of critical infrastructure--and one that is exceedingly vulnerable to a new family of threats, loosely grouped together as information warfare. This detailed volume examines these threats and the evolving U.S. policy response. After examining the dangers posed by information warfare and efforts at threat assessment, Cordesman considers the growing policy response on the part of various federal agencies, state and local governments, and the private sector. The changing nature of the threats is leading these actors to reassess the role they must play in critical infrastructure protection. Government at all levels, industry, and even friendly and neutral foreign governments are learning that an effective response requires coordination in deterrence, defense, and counterattack. Electronic data processingSecurity measuresUnited StatesTelecommunicationDefense measuresUnited StatesComputer networksSecurity measuresUnited StatesInformation warfareUnited StatesElectronic data processingSecurity measuresTelecommunicationDefense measuresComputer networksSecurity measuresInformation warfare005.8Cordesman Anthony H567761Cordesman Justin G1798490Center for Strategic and International Studies (Washington, D.C.)DLCDLCDLCBOOK9910962521303321Cyber-threats, information warfare, and critical infrastructure protection4341296UNINA04543nam 22006735 450 991052371490332120251113190046.03-030-92026-710.1007/978-3-030-92026-5(MiAaPQ)EBC6876629(Au-PeEL)EBL6876629(CKB)21028242900041(PPN)267813333(OCoLC)1294346236(DE-He213)978-3-030-92026-5(iGPub)SPNA0087385(EXLCZ)992102824290004120220130d2022 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSoft Computing for Data Analytics, Classification Model, and Control /edited by Deepak Gupta, Aditya Khamparia, Ashish Khanna, Oscar Castillo1st ed. 2022.Cham :Springer International Publishing :Imprint: Springer,2022.1 online resource (165 pages)Studies in Fuzziness and Soft Computing,1860-0808 ;413Print version: Gupta, Deepak Soft Computing for Data Analytics, Classification Model, and Control Cham : Springer International Publishing AG,c2022 9783030920258 Includes bibliographical references.Chapter 1: An Optimization of Fuzzy Rough Set Nearest Neighbor Classification Model using Krill Herd Algorithm for Sentiment Text Analytics -- Chapter 2: Fuzzy Wavelet Neural Network with Social Spider Optimization Algorithm for Pattern Recognition in Medical Domain -- Chapter 3: Fuzzy with Gravitational Search Algorithm Tuned Radial Basis Function Network for Medical Disease Diagnosis and Classification Model -- Chapter 4: Optimal Neutrosophic Rules based Feature Extraction for Data Classification using Deep Learning Model -- Chapter 5: Self-Evolving Interval Type-2 Fuzzy Neural Network Design for The Synchronization of Chaotic Systems -- Chapter 6: Categorizing Relations via Semi-Supervised Learning using a Hybrid Tolerance Rough Sets and Genetic Algorithm Approach -- Chapter 7: Data-driven Fuzzy C-Means Equivalent Turbine-governor for Power System Frequency Response -- Chapter 8: Multicriteria group decision making using a novel similarity measure for triangular fuzzy numbers based on their newly defined expected values and variances -- Chapter 9: Bangla Printed Character Generation from Handwritten Character Using GAN.This book presents a set of soft computing approaches and their application in data analytics, classification model, and control. The basics of fuzzy logic implementation for advanced hybrid fuzzy driven optimization methods has been covered in the book. The various soft computing techniques, including Fuzzy Logic, Rough Sets, Neutrosophic Sets, Type-2 Fuzzy logic, Neural Networks, Generative Adversarial Networks, and Evolutionary Computation have been discussed and they are used on variety of applications including data analytics, classification model, and control. The book is divided into two thematic parts. The first thematic section covers the various soft computing approaches for text classification and data analysis, while the second section focuses on the fuzzy driven optimization methods for the control systems. The chapters has been written and edited by active researchers, which cover hypotheses and practical considerations; provide insights into the design ofhybrid algorithms for applications in data analytics, classification model, and engineering control.Studies in Fuzziness and Soft Computing,1860-0808 ;413Computational intelligenceArtificial intelligenceData processingBioinformaticsAutomatic controlComputational IntelligenceData ScienceBioinformaticsControl and Systems TheoryComputational intelligence.Artificial intelligenceData processing.Bioinformatics.Automatic control.Computational Intelligence.Data Science.Bioinformatics.Control and Systems Theory.511.3006.3Gupta DeepakMiAaPQMiAaPQMiAaPQBOOK9910523714903321Soft computing for data analytics, classification model, and control2917310UNINA