Autonomous Intelligent Cyber Defense Agent (AICA) [[electronic resource] ] : A Comprehensive Guide / / edited by Alexander Kott |
Autore | Kott Alexander |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (468 pages) |
Disciplina | 355.45 |
Collana | Advances in Information Security |
Soggetto topico |
Artificial intelligence
Computer networks—Security measures Data protection—Law and legislation Artificial Intelligence Mobile and Network Security Privacy |
Soggetto non controllato |
Military Art And Science
Technology & Engineering |
ISBN | 3-031-29269-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and Overview -- Chapter. 2. Alternative Architectural Approaches -- Chapter. 3. Perception of Environment -- Chapter. 4. Perception of Cyber Threats -- Chapter. 5. Situational Understanding and Diagnostics -- Chapter. 6. Learning about the Adversary -- Chapter. 7. Response Planning -- Chapter. 8. Recovery Planning -- Chapter. 9. Strategic Cyber Camouflage -- Chapter. 10. Adaptivity & Antifragility -- Chapter. 11. Negotiation and Collaboration -- Chapter. 12. Human Interactions -- Chapter. 13. Testing and Measurements -- Chapter. 14. Deployment and Operation -- Chapter. 15. Command in AICA-intensive Operations -- Chapter. 16. Risk Management -- Chapter. 17. Policy Issues -- Chapter. 18. Development Challenges -- Chapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense Agent -- Chapter. 20. Case Study B: AI Agents for Tactical Edge -- Chapter. 21. Case Study C: the Sentinel Agents. |
Record Nr. | UNISA-996546821903316 |
Kott Alexander | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Autonomous Intelligent Cyber Defense Agent (AICA) : A Comprehensive Guide / / edited by Alexander Kott |
Autore | Kott Alexander |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (468 pages) |
Disciplina | 355.45 |
Collana | Advances in Information Security |
Soggetto topico |
Artificial intelligence
Computer networks—Security measures Data protection—Law and legislation Artificial Intelligence Mobile and Network Security Privacy |
Soggetto non controllato |
Military Art And Science
Technology & Engineering |
ISBN | 3-031-29269-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and Overview -- Chapter. 2. Alternative Architectural Approaches -- Chapter. 3. Perception of Environment -- Chapter. 4. Perception of Cyber Threats -- Chapter. 5. Situational Understanding and Diagnostics -- Chapter. 6. Learning about the Adversary -- Chapter. 7. Response Planning -- Chapter. 8. Recovery Planning -- Chapter. 9. Strategic Cyber Camouflage -- Chapter. 10. Adaptivity & Antifragility -- Chapter. 11. Negotiation and Collaboration -- Chapter. 12. Human Interactions -- Chapter. 13. Testing and Measurements -- Chapter. 14. Deployment and Operation -- Chapter. 15. Command in AICA-intensive Operations -- Chapter. 16. Risk Management -- Chapter. 17. Policy Issues -- Chapter. 18. Development Challenges -- Chapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense Agent -- Chapter. 20. Case Study B: AI Agents for Tactical Edge -- Chapter. 21. Case Study C: the Sentinel Agents. |
Record Nr. | UNINA-9910728948603321 |
Kott Alexander | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Defense and Situational Awareness / / edited by Alexander Kott, Cliff Wang, Robert F. Erbacher |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (337 p.) |
Disciplina |
004
004.6 005.7 005.8 |
Collana | Advances in Information Security |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Application software Systems and Data Security Computer Communication Networks Cryptology Information Systems Applications (incl. Internet) |
ISBN | 3-319-11391-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preview -- Foundations and Challenges -- Cyber and Kinetic -- Formation of Awareness -- Network-wide Awareness -- Cognition and Technology -- Cognitive Process -- Visualization and Analysts -- Inference and Ontology -- Learning and Semantics -- Impact Assessment -- Attack Projection -- Metrics of Security -- Mission Resilience -- Concluding Thoughts. |
Record Nr. | UNINA-9910298969803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Resilience of Systems and Networks / / edited by Alexander Kott, Igor Linkov |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 475 p. 121 illus., 87 illus. in color.) |
Disciplina | 658.56 |
Collana | Risk, Systems and Decisions |
Soggetto topico |
Quality control
Reliability Industrial safety Computer security Quality Control, Reliability, Safety and Risk Systems and Data Security |
ISBN | 3-319-77492-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Introduction -- Part 1. Quantifying Cyber Resilience -- Chapter 2. Metrics Based on the System Performance Perspective -- Chapter 3. Metrics Based on the Mission Risk Perspective -- Part 2. Assessment and Analysis of Cyber Resilience -- Chapter 4. Frameworks and Best Practices -- Chapter 5. Analysis of Dependencies -- Chapter 6. Applying Percolation Theory -- Chapter 7. Modeling the Impact of Cyber Attacks -- Chapter 8. Modeling and Simulation Approaches -- Part 3. Enhancing Cyber Resilience -- Chapter 9. Systems Engineering Approaches -- Chapter 10. Defense Techniques -- Chapter 11. Managing Human Factors -- Chapter 12. Rule-Making for Insider Threat Mitigation -- Chapter 13. Biologically Inspired AI Techniques -- Chapter 14. Economic Effectiveness of Mitigation and Resilience -- Part 4. Cyber Resilience in Selected Classes of Systems and Networks -- Chapter 15. Regional Critical Infrastructures -- Chapter 16. Internet of Things -- Chapter 17. Smart Cities -- Chapter 18. Transportation Networks -- Chapter 19. Supply Chains. |
Record Nr. | UNINA-9910337466903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber-security of SCADA and Other Industrial Control Systems / / edited by Edward J. M. Colbert, Alexander Kott |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (368 p.) |
Disciplina | 658.478 |
Collana | Advances in Information Security |
Soggetto topico |
Computer security
Computer communication systems Computers Data encryption (Computer science) Systems and Data Security Computer Communication Networks Information Systems and Communication Service Cryptology |
ISBN | 3-319-32125-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction and Preview -- Components of Industrial Control Systems -- Wireless Infrastructure in Industrial Control Systems -- Operational Technology and Information Technology in Industrial Control Systems -- Threats in Industrial Control Systems -- Attacks on Industrial Control Systems -- Security Taxonomies of Industrial Control Systems -- Cyber Risk in Industrial Control Systems -- Security Metrics in Industrial Control Systems -- Situational Awareness in Industrial Control Systems -- Intrusion Detection in Industrial Control Systems -- Cyber Physical Intrusion Detection -- Experimental Methods for Control System Security Research -- Governance and Assessment Strategies for Industrial Control Systems -- Responding to Attacks on Industrial Control Systems and SCADA Systems -- In Conclusion: The Future Internet of Things and Security of its Control Systems. |
Record Nr. | UNINA-9910255006603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity Systems for Human Cognition Augmentation / / edited by Robinson E. Pino, Alexander Kott, Michael Shevenell |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (222 p.) |
Disciplina |
004
004.6 005.7 005.8 |
Collana | Advances in Information Security |
Soggetto topico |
Computer security
Artificial intelligence Neurosciences Computers Computer communication systems Systems and Data Security Artificial Intelligence Information Systems and Communication Service Computer Communication Networks |
ISBN | 3-319-10374-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Situational awareness, sensemaking, and situation understanding in cyber warfare -- Neuromorphic Computing for Cognitive Augmentation in Cyber Defense -- Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance -- Data Mining in Cyber Operations -- Trusted Computation through Biologically Inspired Processes -- Dynamic Logic Machine Learning for Cybersecurity -- Towards Neural Network Based Malware Detection on Android Mobile Devices -- Sustainability Problems and a Novelty in the Concept of Energy -- Memristors as Synapses in Artificial Neural Networks: Biomimicry Beyond Weight Change -- Low Power Neuromorphic Architectures to Enable Pervasive Deployment of Intrusion Detection Systems -- Memristor SPICE Model Simulation and Device Hardware Correlation -- Reconfigurable Memristor Based Computing Logic -- Cyber Security Considerations for Reconfigurable Systems. |
Record Nr. | UNINA-9910298993003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information warfare and organizational decision-making / / Alexander Kott, editor |
Pubbl/distr/stampa | Boston : , : Artech House, , ©2007 |
Descrizione fisica | 1 online resource (293 p.) |
Disciplina | 658.4032 |
Altri autori (Persone) | KottAlexander |
Collana | Artech House information warfare series |
Soggetto topico |
Information warfare
Decision making Associations, institutions, etc - Decision making |
Soggetto genere / forma | Electronic books. |
ISBN | 1-59693-080-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Know they enemy : acquisition, representation, and management of knowledge about adversary organizations / Ed Waltz -- Learning from the enemy : approaches to identifying and modeling the hidden enemy organization / Kari Kelton [and others] -- Who's calling? Deriving organization structure from communication records / D. Andrew "Disco" Gerdes, Clark Glymour, and Joseph Ramsey -- Means and ways : practical approaches to impact adversary decision-making processes / Ed Waltz -- Breakdown of control : common malfunctions of organizational decision-making / Alexander Kott -- Propagation of defeat : inducing and mitigating a self-reinforcing degradation / |
Record Nr. | UNINA-9910451100103321 |
Boston : , : Artech House, , ©2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information warfare and organizational decision-making / / Alexander Kott, editor |
Pubbl/distr/stampa | Boston : , : Artech House, , ©2007 |
Descrizione fisica | 1 online resource (293 p.) |
Disciplina | 658.4032 |
Altri autori (Persone) | KottAlexander |
Collana | Artech House information warfare series |
Soggetto topico |
Information warfare
Decision making Associations, institutions, etc - Decision making |
ISBN | 1-59693-080-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Know they enemy : acquisition, representation, and management of knowledge about adversary organizations / Ed Waltz -- Learning from the enemy : approaches to identifying and modeling the hidden enemy organization / Kari Kelton [and others] -- Who's calling? Deriving organization structure from communication records / D. Andrew "Disco" Gerdes, Clark Glymour, and Joseph Ramsey -- Means and ways : practical approaches to impact adversary decision-making processes / Ed Waltz -- Breakdown of control : common malfunctions of organizational decision-making / Alexander Kott -- Propagation of defeat : inducing and mitigating a self-reinforcing degradation / |
Record Nr. | UNINA-9910784828203321 |
Boston : , : Artech House, , ©2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information warfare and organizational decision-making / / Alexander Kott, editor |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Boston, : Artech House, c2007 |
Descrizione fisica | 1 online resource (293 p.) |
Disciplina | 658.4032 |
Altri autori (Persone) | KottAlexander |
Collana | Artech House information warfare series |
Soggetto topico |
Information warfare
Decision making Associations, institutions, etc - Decision making |
ISBN | 1-59693-080-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Know they enemy : acquisition, representation, and management of knowledge about adversary organizations / Ed Waltz -- Learning from the enemy : approaches to identifying and modeling the hidden enemy organization / Kari Kelton [and others] -- Who's calling? Deriving organization structure from communication records / D. Andrew "Disco" Gerdes, Clark Glymour, and Joseph Ramsey -- Means and ways : practical approaches to impact adversary decision-making processes / Ed Waltz -- Breakdown of control : common malfunctions of organizational decision-making / Alexander Kott -- Propagation of defeat : inducing and mitigating a self-reinforcing degradation / |
Record Nr. | UNINA-9910816001103321 |
Boston, : Artech House, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|