top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 289 p. 68 illus., 59 illus. in color.)
Disciplina 005.8
Soggetto topico Computer security
Artificial intelligence
Computer communication systems
Systems and Data Security
Artificial Intelligence
Computer Communication Networks
ISBN 3-030-33432-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software.
Record Nr. UNISA-996465351503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Adaptive Autonomous Secure Cyber Systems / / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Adaptive Autonomous Secure Cyber Systems / / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 289 p. 68 illus., 59 illus. in color.)
Disciplina 005.8
Soggetto topico Computer security
Artificial intelligence
Computer communication systems
Systems and Data Security
Artificial Intelligence
Computer Communication Networks
ISBN 3-030-33432-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software.
Record Nr. UNINA-9910380755503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Deception : Building the Scientific Foundation / / edited by Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
Cyber Deception : Building the Scientific Foundation / / edited by Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (X, 312 p. 111 illus.)
Disciplina 005.8
Soggetto topico Computer security
Computer communication systems
Application software
Data encryption (Computer science)
Electrical engineering
Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Cryptology
Communications Engineering, Networks
ISBN 3-319-32699-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception -- Quantifying Covertness in Deceptive Cyber Deception -- Design Considerations for Building Cyber Deception Systems -- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks -- Effective Cyber Deception -- Cyber-Deception and Attribution in Capture-the-Flag Exercises -- Deceiving Attackers by Creating a Virtual Attack Surface -- Embedded Honeypotting -- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks -- Exploring Malicious Hacker Forums -- Anonymity in an electronic Society: A Survey.
Record Nr. UNINA-9910255005903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Warfare : Building the Scientific Foundation / / edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
Cyber Warfare : Building the Scientific Foundation / / edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (326 p.)
Disciplina 004
004.6
005.7
005.8
005.82
Collana Advances in Information Security
Soggetto topico Computer security
Data encryption (Computer science)
Computer networks
Application software
Systems and Data Security
Cryptology
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-319-14039-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber War Games -- Alternatives to Cyber Warfare: Deterrence and Assurance -- Identifying and Exploiting the Cyber High Ground with Botnets -- Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberfare -- Game-theoretic Foundations for the Strategic Use of Honeypots in Network Security -- Cyber Counterdeception: How to Detect Denial & Deception -- Automated Adversary Profiling -- Cyber Attribution: An Argumentation-Based Approach -- The Human Factor in Cybersecurity: Robust & Intelligent Defense -- CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War -- Active Discovery of Hidden Profiles in Social Networks using Malware -- A Survey of Community Detection Algorithms Based on Analysis-Intent -- Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks -- Graph Mining for Cyber Security -- Programming language theoretic security in the real world: a mirage or the future?.
Record Nr. UNINA-9910299252203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data-driven generation of policies / / Austin Parker [and three others]
Data-driven generation of policies / / Austin Parker [and three others]
Autore Parker Austin
Edizione [1st ed. 2014.]
Pubbl/distr/stampa New York : , : Springer, , 2014
Descrizione fisica 1 online resource (x, 50 pages) : illustrations
Disciplina 004
005.55
Collana SpringerBriefs in Computer Science
Soggetto topico Computer algorithms
Artificial intelligence
ISBN 1-4939-0274-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction and Related Work -- Optimal State Change Attempts -- Different Kinds of Effect Estimators -- A Comparison with Planning under Uncertainty -- Experimental Evaluation -- Conclusions.
Record Nr. UNINA-9910298563603321
Parker Austin  
New York : , : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui