04887nam 22006255 450 99654682190331620230602172103.03-031-29269-310.1007/978-3-031-29269-9(MiAaPQ)EBC30564808(Au-PeEL)EBL30564808(OCoLC)1381710952(DE-He213)978-3-031-29269-9(BIP)088809076(PPN)272261211(EXLCZ)992682165830004120230602d2023 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAutonomous Intelligent Cyber Defense Agent (AICA)[electronic resource] A Comprehensive Guide /edited by Alexander Kott1st ed. 2023.Cham :Springer International Publishing :Imprint: Springer,2023.1 online resource (468 pages)Advances in Information Security,2512-2193 ;87Print version: Kott, Alexander Autonomous Intelligent Cyber Defense Agent (AICA) Cham : Springer International Publishing AG,c2023 9783031292682 Chapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and Overview -- Chapter. 2. Alternative Architectural Approaches -- Chapter. 3. Perception of Environment -- Chapter. 4. Perception of Cyber Threats -- Chapter. 5. Situational Understanding and Diagnostics -- Chapter. 6. Learning about the Adversary -- Chapter. 7. Response Planning -- Chapter. 8. Recovery Planning -- Chapter. 9. Strategic Cyber Camouflage -- Chapter. 10. Adaptivity & Antifragility -- Chapter. 11. Negotiation and Collaboration -- Chapter. 12. Human Interactions -- Chapter. 13. Testing and Measurements -- Chapter. 14. Deployment and Operation -- Chapter. 15. Command in AICA-intensive Operations -- Chapter. 16. Risk Management -- Chapter. 17. Policy Issues -- Chapter. 18. Development Challenges -- Chapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense Agent -- Chapter. 20. Case Study B: AI Agents for Tactical Edge -- Chapter. 21. Case Study C: the Sentinel Agents.This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is accessible to non-specialists, with tutorial information provided in the initial chapters and as needed throughout the book. The reader is provided with clear and comprehensive background and reference material for each aspect of AICA. Today’s cyber defense tools are mostly watchers. They are not active doers. They do little to plan and execute responses to attacks, and they don’t plan and execute recovery activities. Response and recovery – core elements of cyber resilience – are left to human cyber analysts, incident responders and system administrators. This is about to change. The authors advocate this vision, provide detailed guide to how such a vision can be realized in practice, and its current state of the art. This book also covers key topics relevant to the field, including functional requirements and alternative architectures of AICA, how it perceives and understands threats and the overall situation, how it plans and executes response and recovery, how it survives threats, and how human operators deploy and control AICA. Additionally, this book covers issues of testing, risk, and policy pertinent to AICA, and provides a roadmap towards future R&D in this field. This book targets researchers and advanced students in the field of cyber defense and resilience. Professionals working in this field as well as developers of practical products for cyber autonomy will also want to purchase this book.Advances in Information Security,2512-2193 ;87Artificial intelligenceComputer networks—Security measuresData protection—Law and legislationArtificial IntelligenceMobile and Network SecurityPrivacyMilitary Art And ScienceTechnology & EngineeringArtificial intelligence.Computer networks—Security measures.Data protection—Law and legislation.Artificial Intelligence.Mobile and Network Security.Privacy.355.45Kott Alexander1177877Kott AlexanderedtMiAaPQMiAaPQMiAaPQBOOK996546821903316Autonomous Intelligent Cyber Defense Agent (AICA)3384461UNISA02028nam 2200385 450 99627956410331620231206174006.00-7381-1103-110.1109/IEEESTD.1987.79148(CKB)3780000000089236(NjHacI)993780000000089236(EXLCZ)99378000000008923620231206d1987 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierANSI/IEEE Std 929-1988 IEEE Recommended Practice for Utility Interface of Residential and Intermediate Photovoltaic (PV) Systems /Institute of Electrical and Electronics EngineersPiscataway, NJ :IEEE,1987.1 online resource (12 pages)Superseded by 929-2000. Recommendations and requirements that ensure operation of the terrestrial photovoltaic (PV) system that is compatible with the electric utility are provided. Factors relating to personnel safety, equipment protection, and power quality are addressed. The standard applies to utility-interconnected residential and interm ediate-size PV power systems capable of two-way energy flow with the utility. It addresses the interface between the PV system and the utility, and provides technical recommendations for the characteristics of the interface. Power quality, equipment protection, and safety of personnel are covered.929-1988 - IEEE Recommended Practice for Utility Interface of Residential and Intermediate Photovoltaic ANSI/IEEE Std 929-1988: IEEE Recommended Practice for Utility Interface of Residential and Intermediate Photovoltaic (PV) SystemsPhotovoltaic power systemsIndustrial safetyPhotovoltaic power systems.Industrial safety.621.31244NjHacINjHaclDOCUMENT996279564103316ANSI2072434UNISA