05504nam 22006135 450 99646535150331620200702232607.03-030-33432-510.1007/978-3-030-33432-1(CKB)4100000010348038(DE-He213)978-3-030-33432-1(MiAaPQ)EBC6039470(PPN)242981410(EXLCZ)99410000001034803820200204d2020 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAdaptive Autonomous Secure Cyber Systems[electronic resource] /edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (X, 289 p. 68 illus., 59 illus. in color.) 3.2 Formalizing Data Triage Operations.3-030-33431-7 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software.This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system. This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment. Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security. This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.Computer securityArtificial intelligenceComputer communication systemsSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Artificial Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/I21000Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Computer security.Artificial intelligence.Computer communication systems.Systems and Data Security.Artificial Intelligence.Computer Communication Networks.005.8Jajodia Sushiledthttp://id.loc.gov/vocabulary/relators/edtCybenko Georgeedthttp://id.loc.gov/vocabulary/relators/edtSubrahmanian V.Sedthttp://id.loc.gov/vocabulary/relators/edtSwarup Vipinedthttp://id.loc.gov/vocabulary/relators/edtWang Cliffedthttp://id.loc.gov/vocabulary/relators/edtWellman Michaeledthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996465351503316Adaptive Autonomous Secure Cyber Systems1927988UNISA01089nam a2200265 i 4500991003276959707536160913s1994 maua 001 0 eng db1430756x-39ule_instBibl. Dip.le Aggr. Ingegneria Innovazione - Sez. Ingegneria Innovazioneeng005.72BBEdit 5.0 :high-performance HTML and text editing for the MacintoshBedford, MA :Bare Bones Software,c1994xvi, 274 p. :ill. ;23 cmIncludes indexBBEdit (Computer file)HTML (Document markup language)Text editors (Computer programs)Web sitesDesignBare Bones Software, Inc.b1430756x13-09-1613-09-16991003276959707536LE026 005.72 BBE 01.01 1994 Scaff. A/512026000070568le026Riporre sullo scaffale A/5Prof. Tommasi / DonogE20.00-l- 00000.i1578073913-09-16BBEdit 5.01392427UNISALENTOle02613-09-16ma engmau0003682nam 2200733 450 991082303070332120230125185307.01-63157-028-5(CKB)2670000000588388(EBL)1901826(SSID)ssj0001537040(PQKBManifestationID)11869878(PQKBTitleCode)TC0001537040(PQKBWorkID)11512829(PQKB)11581481(OCoLC)900011256(CaBNVSL)swl00404590(CaSebORM)9781631570278(MiAaPQ)EBC1901826(EXLCZ)99267000000058838820150111d2015 fy 0engur|n|---|||||txtccrFeasibility analysis for sustainable technologies an engineering-economic perspective /Scott R. HerriottFirst edition.New York, New York (222 East 46th Street, New York, NY 10017) :Business Expert Press,2015.1 online resource (318 p.)Environmental and social sustainability for business advantage collection,2327-3348Description based upon print version of record.1-322-51943-9 1-63157-027-7 Includes bibliographical references (pages 285-293) and index.1. Sustainable technologies -- 2. Capacity -- 3. Efficiency -- 4. Constraints -- 5. Dependability -- 6. Cost structure -- 7. Break-even analysis -- 8. Basic financial analysis of technology -- 9. Valuation of commercial projects -- 10. Accounting for environmental benefits -- Appendices -- About the author -- Notes -- References -- Index.This book leads the reader into a professional feasibility analysis for a renewable energy or energy efficiency project. The analysis begins with an understanding of the basic engineering description of technology in terms of capacity, efficiency, constraints, and dependability. It continues in modeling the cash flow of a project, which is affected by the installed cost, the revenues or expenses avoided by using the technology, the operating expenses of the technology, available tax credits and rebates, and laws regarding depreciation and income tax. The feasibility study is completed by discounted cash flow analysis, using an appropriate discount rate and a proper accounting for inflation, to evaluate the financial viability of the project. The elements of this analysis are illustrated using numerous examples of solar, wind, and hydroelectric power, biogas digestion, energy storage, biofuels, and energy-efficient appliances and buildings.Environmental and social sustainability for business advantage collection.2327-3348Sustainable developmentManagementFeasibility studiesbiofuelsbiogas digestionenergy efficiencyenergy storagefeasibility analysisfeasibility studyhydroelectric powerrenewable energyrenewable power systemssolar photovoltaicssolar thermal electric powersustainable technologieswind powerSustainable developmentManagement.Feasibility studies.628Herriott Scott R.1660066MiAaPQMiAaPQMiAaPQBOOK9910823030703321Feasibility analysis for sustainable technologies4015055UNINA