LEADER 04525nam 22008415 450 001 996465887903316 005 20200701014607.0 010 $a3-642-23496-8 024 7 $a10.1007/978-3-642-23496-5 035 $a(CKB)2550000000051642 035 $a(SSID)ssj0000609207 035 $a(PQKBManifestationID)11393929 035 $a(PQKBTitleCode)TC0000609207 035 $a(PQKBWorkID)10610068 035 $a(PQKB)11124618 035 $a(DE-He213)978-3-642-23496-5 035 $a(MiAaPQ)EBC3067078 035 $a(PPN)156314142 035 $a(EXLCZ)992550000000051642 100 $a20110824d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAutonomic and Trusted Computing$b[electronic resource] $e8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedings /$fedited by Jose M. Alcaraz Calero, Laurence T. Yang, Felix Gomez-Marmol, Luis Javier García Villalba, Andy Xiaolin Li, Yan Wang 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XII, 259 p.) 225 1 $aProgramming and Software Engineering ;$v6906 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-23495-X 320 $aIncludes bibliographical references and index. 327 $aEnhancing OpenID through a reputation framework / Fe?lix Go?mez Ma?rmol, Marcus Quintano Kuhnen, Gregorio Marti?nez Pe?rez -- Concept of a reflex manager to enhance the planner component of an authonic/organic system / Julia Schmitt, Michael Roth, Rolf Kiefhaber, Florian Kluge, Theo Ungerer. 330 $aThis book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada, September 2011. The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications. 410 0$aProgramming and Software Engineering ;$v6906 606 $aComputer security 606 $aSoftware engineering 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aApplication software 606 $aManagement information systems 606 $aComputer science 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer security. 615 0$aSoftware engineering. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aSystems and Data Security. 615 24$aSoftware Engineering. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aAlcaraz Calero$b Jose M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYang$b Laurence T$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGomez-Marmol$b Felix$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGarcía Villalba$b Luis Javier$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Andy Xiaolin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Yan$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465887903316 996 $aAutonomic and Trusted Computing$9773129 997 $aUNISA LEADER 05228nam 22006135 450 001 9910380755503321 005 20251113212531.0 010 $a3-030-33432-5 024 7 $a10.1007/978-3-030-33432-1 035 $a(CKB)4100000010348038 035 $a(DE-He213)978-3-030-33432-1 035 $a(MiAaPQ)EBC6039470 035 $a(PPN)242981410 035 $a(EXLCZ)994100000010348038 100 $a20200204d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdaptive Autonomous Secure Cyber Systems /$fedited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (X, 289 p. 68 illus., 59 illus. in color.) 300 $a3.2 Formalizing Data Triage Operations. 311 08$a3-030-33431-7 327 $a1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. AnEmpirical Study of Secret Security Patch in Open Source Software. 330 $aThis book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system. This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment. Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security. This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook. 606 $aData protection 606 $aArtificial intelligence 606 $aComputer networks 606 $aData and Information Security 606 $aArtificial Intelligence 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aArtificial intelligence. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aArtificial Intelligence. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aJajodia$b Sushil$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCybenko$b George$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSubrahmanian$b V.S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSwarup$b Vipin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Cliff$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWellman$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910380755503321 996 $aAdaptive Autonomous Secure Cyber Systems$91927988 997 $aUNINA