Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (X, 289 p. 68 illus., 59 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Systems and Data Security Artificial Intelligence Computer Communication Networks |
ISBN | 3-030-33432-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software. |
Record Nr. | UNISA-996465351503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Adaptive Autonomous Secure Cyber Systems / / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (X, 289 p. 68 illus., 59 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Systems and Data Security Artificial Intelligence Computer Communication Networks |
ISBN | 3-030-33432-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software. |
Record Nr. | UNINA-9910380755503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Deception : Building the Scientific Foundation / / edited by Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (X, 312 p. 111 illus.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computer communication systems Application software Data encryption (Computer science) Electrical engineering Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Cryptology Communications Engineering, Networks |
ISBN | 3-319-32699-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception -- Quantifying Covertness in Deceptive Cyber Deception -- Design Considerations for Building Cyber Deception Systems -- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks -- Effective Cyber Deception -- Cyber-Deception and Attribution in Capture-the-Flag Exercises -- Deceiving Attackers by Creating a Virtual Attack Surface -- Embedded Honeypotting -- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks -- Exploring Malicious Hacker Forums -- Anonymity in an electronic Society: A Survey. |
Record Nr. | UNINA-9910255005903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Warfare : Building the Scientific Foundation / / edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (326 p.) |
Disciplina |
004
004.6 005.7 005.8 005.82 |
Collana | Advances in Information Security |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer networks Application software Systems and Data Security Cryptology Computer Communication Networks Information Systems Applications (incl. Internet) |
ISBN | 3-319-14039-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cyber War Games -- Alternatives to Cyber Warfare: Deterrence and Assurance -- Identifying and Exploiting the Cyber High Ground with Botnets -- Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberfare -- Game-theoretic Foundations for the Strategic Use of Honeypots in Network Security -- Cyber Counterdeception: How to Detect Denial & Deception -- Automated Adversary Profiling -- Cyber Attribution: An Argumentation-Based Approach -- The Human Factor in Cybersecurity: Robust & Intelligent Defense -- CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War -- Active Discovery of Hidden Profiles in Social Networks using Malware -- A Survey of Community Detection Algorithms Based on Analysis-Intent -- Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks -- Graph Mining for Cyber Security -- Programming language theoretic security in the real world: a mirage or the future?. |
Record Nr. | UNINA-9910299252203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data-driven generation of policies / / Austin Parker [and three others] |
Autore | Parker Austin |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | New York : , : Springer, , 2014 |
Descrizione fisica | 1 online resource (x, 50 pages) : illustrations |
Disciplina |
004
005.55 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Computer algorithms
Artificial intelligence |
ISBN | 1-4939-0274-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction and Related Work -- Optimal State Change Attempts -- Different Kinds of Effect Estimators -- A Comparison with Planning under Uncertainty -- Experimental Evaluation -- Conclusions. |
Record Nr. | UNINA-9910298563603321 |
Parker Austin | ||
New York : , : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|