LEADER 04033nam 22006495 450 001 9910299662503321 005 20200707023233.0 010 $a3-319-08624-3 024 7 $a10.1007/978-3-319-08624-8 035 $a(CKB)3710000000228696 035 $a(SSID)ssj0001353972 035 $a(PQKBManifestationID)11730304 035 $a(PQKBTitleCode)TC0001353972 035 $a(PQKBWorkID)11316903 035 $a(PQKB)10836016 035 $a(DE-He213)978-3-319-08624-8 035 $a(MiAaPQ)EBC6281293 035 $a(MiAaPQ)EBC5577891 035 $a(Au-PeEL)EBL5577891 035 $a(OCoLC)890906314 035 $a(PPN)181352672 035 $a(EXLCZ)993710000000228696 100 $a20140903d2015 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aIntelligent Methods for Cyber Warfare$b[electronic resource] /$fedited by Ronald R. Yager, Marek Z. Reformat, Naif Alajlan 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XII, 278 p. 58 illus.) 225 1 $aStudies in Computational Intelligence,$x1860-949X ;$v563 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-08623-5 327 $aMalware and Machine Learning -- Soft Computing Based Epidemical Crisis Prediction -- An ACP-Based Approach to Intelligence and Security Informatics -- Microfiles as a Potential Source of Confidential Information Leakage -- Decision Support in Open Source Intelligence -- Information Fusion Process Design Issues for Hard and Soft Information: Developing an Initial Prototype -- Intrusion Detection with Type-2 Fuzzy Ontologies and Similarity Measures -- A multi-objective genetic algorithm based approach for effective intrusion detection using neural networks -- Cyber Insider Mission Detection for Situation Awareness -- A Game Theoretic Engine for Cyber Warfare -- Mission Impact Assessment for Cyber Warfare -- Uncertainty modeling: the Computational Economists? View on Cyberwarfare. 330 $aCyberwarfare has become an important concern for governmental agencies as well businesses of various types.  This timely volume, with contributions from some of the internationally recognized, leaders in the field, gives readers a glimpse of the new and emerging ways that Computational Intelligence and Machine Learning methods can be applied to address problems related to cyberwarfare. The book includes a number of chapters that can be conceptually divided into three topics: chapters describing different data analysis methodologies with their applications to cyberwarfare, chapters presenting a number of intrusion detection approaches, and chapters dedicated to analysis of possible cyber attacks and their impact. The book provides the readers with a variety of methods and techniques, based on computational intelligence, which can be applied to the broad domain of cyberwarfare. 410 0$aStudies in Computational Intelligence,$x1860-949X ;$v563 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aComputational Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/T11014 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 14$aComputational Intelligence. 615 24$aArtificial Intelligence. 676 $a005.82 702 $aYager$b Ronald R$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aReformat$b Marek Z$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAlajlan$b Naif$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299662503321 996 $aIntelligent Methods for Cyber Warfare$91466143 997 $aUNINA