top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Autonomous Intelligent Cyber Defense Agent (AICA) [[electronic resource] ] : A Comprehensive Guide / / edited by Alexander Kott
Autonomous Intelligent Cyber Defense Agent (AICA) [[electronic resource] ] : A Comprehensive Guide / / edited by Alexander Kott
Autore Kott Alexander
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (468 pages)
Disciplina 355.45
Collana Advances in Information Security
Soggetto topico Artificial intelligence
Computer networks—Security measures
Data protection—Law and legislation
Artificial Intelligence
Mobile and Network Security
Privacy
Soggetto non controllato Military Art And Science
Technology & Engineering
ISBN 3-031-29269-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and Overview -- Chapter. 2. Alternative Architectural Approaches -- Chapter. 3. Perception of Environment -- Chapter. 4. Perception of Cyber Threats -- Chapter. 5. Situational Understanding and Diagnostics -- Chapter. 6. Learning about the Adversary -- Chapter. 7. Response Planning -- Chapter. 8. Recovery Planning -- Chapter. 9. Strategic Cyber Camouflage -- Chapter. 10. Adaptivity & Antifragility -- Chapter. 11. Negotiation and Collaboration -- Chapter. 12. Human Interactions -- Chapter. 13. Testing and Measurements -- Chapter. 14. Deployment and Operation -- Chapter. 15. Command in AICA-intensive Operations -- Chapter. 16. Risk Management -- Chapter. 17. Policy Issues -- Chapter. 18. Development Challenges -- Chapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense Agent -- Chapter. 20. Case Study B: AI Agents for Tactical Edge -- Chapter. 21. Case Study C: the Sentinel Agents.
Record Nr. UNISA-996546821903316
Kott Alexander  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Autonomous Intelligent Cyber Defense Agent (AICA) : A Comprehensive Guide / / edited by Alexander Kott
Autonomous Intelligent Cyber Defense Agent (AICA) : A Comprehensive Guide / / edited by Alexander Kott
Autore Kott Alexander
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (468 pages)
Disciplina 355.45
Collana Advances in Information Security
Soggetto topico Artificial intelligence
Computer networks—Security measures
Data protection—Law and legislation
Artificial Intelligence
Mobile and Network Security
Privacy
Soggetto non controllato Military Art And Science
Technology & Engineering
ISBN 3-031-29269-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and Overview -- Chapter. 2. Alternative Architectural Approaches -- Chapter. 3. Perception of Environment -- Chapter. 4. Perception of Cyber Threats -- Chapter. 5. Situational Understanding and Diagnostics -- Chapter. 6. Learning about the Adversary -- Chapter. 7. Response Planning -- Chapter. 8. Recovery Planning -- Chapter. 9. Strategic Cyber Camouflage -- Chapter. 10. Adaptivity & Antifragility -- Chapter. 11. Negotiation and Collaboration -- Chapter. 12. Human Interactions -- Chapter. 13. Testing and Measurements -- Chapter. 14. Deployment and Operation -- Chapter. 15. Command in AICA-intensive Operations -- Chapter. 16. Risk Management -- Chapter. 17. Policy Issues -- Chapter. 18. Development Challenges -- Chapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense Agent -- Chapter. 20. Case Study B: AI Agents for Tactical Edge -- Chapter. 21. Case Study C: the Sentinel Agents.
Record Nr. UNINA-9910728948603321
Kott Alexander  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Defense and Situational Awareness / / edited by Alexander Kott, Cliff Wang, Robert F. Erbacher
Cyber Defense and Situational Awareness / / edited by Alexander Kott, Cliff Wang, Robert F. Erbacher
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (337 p.)
Disciplina 004
004.6
005.7
005.8
Collana Advances in Information Security
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Application software
Systems and Data Security
Computer Communication Networks
Cryptology
Information Systems Applications (incl. Internet)
ISBN 3-319-11391-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preview -- Foundations and Challenges -- Cyber and Kinetic -- Formation of Awareness -- Network-wide Awareness -- Cognition and Technology -- Cognitive Process -- Visualization and Analysts -- Inference and Ontology -- Learning and Semantics -- Impact Assessment -- Attack Projection -- Metrics of Security -- Mission Resilience -- Concluding Thoughts.
Record Nr. UNINA-9910298969803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Resilience of Systems and Networks / / edited by Alexander Kott, Igor Linkov
Cyber Resilience of Systems and Networks / / edited by Alexander Kott, Igor Linkov
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 475 p. 121 illus., 87 illus. in color.)
Disciplina 658.56
Collana Risk, Systems and Decisions
Soggetto topico Quality control
Reliability
Industrial safety
Computer security
Quality Control, Reliability, Safety and Risk
Systems and Data Security
ISBN 3-319-77492-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction -- Part 1. Quantifying Cyber Resilience -- Chapter 2. Metrics Based on the System Performance Perspective -- Chapter 3. Metrics Based on the Mission Risk Perspective -- Part 2. Assessment and Analysis of Cyber Resilience -- Chapter 4. Frameworks and Best Practices -- Chapter 5. Analysis of Dependencies -- Chapter 6. Applying Percolation Theory -- Chapter 7. Modeling the Impact of Cyber Attacks -- Chapter 8. Modeling and Simulation Approaches -- Part 3. Enhancing Cyber Resilience -- Chapter 9. Systems Engineering Approaches -- Chapter 10. Defense Techniques -- Chapter 11. Managing Human Factors -- Chapter 12. Rule-Making for Insider Threat Mitigation -- Chapter 13. Biologically Inspired AI Techniques -- Chapter 14. Economic Effectiveness of Mitigation and Resilience -- Part 4. Cyber Resilience in Selected Classes of Systems and Networks -- Chapter 15. Regional Critical Infrastructures -- Chapter 16. Internet of Things -- Chapter 17. Smart Cities -- Chapter 18. Transportation Networks -- Chapter 19. Supply Chains.
Record Nr. UNINA-9910337466903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber-security of SCADA and Other Industrial Control Systems / / edited by Edward J. M. Colbert, Alexander Kott
Cyber-security of SCADA and Other Industrial Control Systems / / edited by Edward J. M. Colbert, Alexander Kott
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (368 p.)
Disciplina 658.478
Collana Advances in Information Security
Soggetto topico Computer security
Computer communication systems
Computers
Data encryption (Computer science)
Systems and Data Security
Computer Communication Networks
Information Systems and Communication Service
Cryptology
ISBN 3-319-32125-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction and Preview -- Components of Industrial Control Systems -- Wireless Infrastructure in Industrial Control Systems -- Operational Technology and Information Technology in Industrial Control Systems -- Threats in Industrial Control Systems -- Attacks on Industrial Control Systems -- Security Taxonomies of Industrial Control Systems -- Cyber Risk in Industrial Control Systems -- Security Metrics in Industrial Control Systems -- Situational Awareness in Industrial Control Systems -- Intrusion Detection in Industrial Control Systems -- Cyber Physical Intrusion Detection -- Experimental Methods for Control System Security Research -- Governance and Assessment Strategies for Industrial Control Systems -- Responding to Attacks on Industrial Control Systems and SCADA Systems -- In Conclusion: The Future Internet of Things and Security of its Control Systems.
Record Nr. UNINA-9910255006603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity Systems for Human Cognition Augmentation / / edited by Robinson E. Pino, Alexander Kott, Michael Shevenell
Cybersecurity Systems for Human Cognition Augmentation / / edited by Robinson E. Pino, Alexander Kott, Michael Shevenell
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (222 p.)
Disciplina 004
004.6
005.7
005.8
Collana Advances in Information Security
Soggetto topico Computer security
Artificial intelligence
Neurosciences
Computers
Computer communication systems
Systems and Data Security
Artificial Intelligence
Information Systems and Communication Service
Computer Communication Networks
ISBN 3-319-10374-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Situational awareness, sensemaking, and situation understanding in cyber warfare -- Neuromorphic Computing for Cognitive Augmentation in Cyber Defense -- Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance -- Data Mining in Cyber Operations -- Trusted Computation through Biologically Inspired Processes -- Dynamic Logic Machine Learning for Cybersecurity -- Towards Neural Network Based Malware Detection on Android Mobile Devices -- Sustainability Problems and a Novelty in the Concept of Energy -- Memristors as Synapses in Artificial Neural Networks: Biomimicry Beyond Weight Change -- Low Power Neuromorphic Architectures to Enable Pervasive Deployment of Intrusion Detection Systems -- Memristor SPICE Model Simulation and Device Hardware Correlation -- Reconfigurable Memristor Based Computing Logic -- Cyber Security Considerations for Reconfigurable Systems.
Record Nr. UNINA-9910298993003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information warfare and organizational decision-making / / Alexander Kott, editor
Information warfare and organizational decision-making / / Alexander Kott, editor
Pubbl/distr/stampa Boston : , : Artech House, , ©2007
Descrizione fisica 1 online resource (293 p.)
Disciplina 658.4032
Altri autori (Persone) KottAlexander
Collana Artech House information warfare series
Soggetto topico Information warfare
Decision making
Associations, institutions, etc - Decision making
Soggetto genere / forma Electronic books.
ISBN 1-59693-080-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Know they enemy : acquisition, representation, and management of knowledge about adversary organizations / Ed Waltz -- Learning from the enemy : approaches to identifying and modeling the hidden enemy organization / Kari Kelton [and others] -- Who's calling? Deriving organization structure from communication records / D. Andrew "Disco" Gerdes, Clark Glymour, and Joseph Ramsey -- Means and ways : practical approaches to impact adversary decision-making processes / Ed Waltz -- Breakdown of control : common malfunctions of organizational decision-making / Alexander Kott -- Propagation of defeat : inducing and mitigating a self-reinforcing degradation /
Record Nr. UNINA-9910451100103321
Boston : , : Artech House, , ©2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information warfare and organizational decision-making / / Alexander Kott, editor
Information warfare and organizational decision-making / / Alexander Kott, editor
Pubbl/distr/stampa Boston : , : Artech House, , ©2007
Descrizione fisica 1 online resource (293 p.)
Disciplina 658.4032
Altri autori (Persone) KottAlexander
Collana Artech House information warfare series
Soggetto topico Information warfare
Decision making
Associations, institutions, etc - Decision making
ISBN 1-59693-080-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Know they enemy : acquisition, representation, and management of knowledge about adversary organizations / Ed Waltz -- Learning from the enemy : approaches to identifying and modeling the hidden enemy organization / Kari Kelton [and others] -- Who's calling? Deriving organization structure from communication records / D. Andrew "Disco" Gerdes, Clark Glymour, and Joseph Ramsey -- Means and ways : practical approaches to impact adversary decision-making processes / Ed Waltz -- Breakdown of control : common malfunctions of organizational decision-making / Alexander Kott -- Propagation of defeat : inducing and mitigating a self-reinforcing degradation /
Record Nr. UNINA-9910784828203321
Boston : , : Artech House, , ©2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information warfare and organizational decision-making / / Alexander Kott, editor
Information warfare and organizational decision-making / / Alexander Kott, editor
Edizione [1st ed.]
Pubbl/distr/stampa Boston, : Artech House, c2007
Descrizione fisica 1 online resource (293 p.)
Disciplina 658.4032
Altri autori (Persone) KottAlexander
Collana Artech House information warfare series
Soggetto topico Information warfare
Decision making
Associations, institutions, etc - Decision making
ISBN 1-59693-080-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Know they enemy : acquisition, representation, and management of knowledge about adversary organizations / Ed Waltz -- Learning from the enemy : approaches to identifying and modeling the hidden enemy organization / Kari Kelton [and others] -- Who's calling? Deriving organization structure from communication records / D. Andrew "Disco" Gerdes, Clark Glymour, and Joseph Ramsey -- Means and ways : practical approaches to impact adversary decision-making processes / Ed Waltz -- Breakdown of control : common malfunctions of organizational decision-making / Alexander Kott -- Propagation of defeat : inducing and mitigating a self-reinforcing degradation /
Record Nr. UNINA-9910816001103321
Boston, : Artech House, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui