Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (X, 289 p. 68 illus., 59 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Systems and Data Security Artificial Intelligence Computer Communication Networks |
ISBN | 3-030-33432-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software. |
Record Nr. | UNISA-996465351503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Adaptive Autonomous Secure Cyber Systems / / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (X, 289 p. 68 illus., 59 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Systems and Data Security Artificial Intelligence Computer Communication Networks |
ISBN | 3-030-33432-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software. |
Record Nr. | UNINA-9910380755503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Deception : Building the Scientific Foundation / / edited by Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (X, 312 p. 111 illus.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computer communication systems Application software Data encryption (Computer science) Electrical engineering Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Cryptology Communications Engineering, Networks |
ISBN | 3-319-32699-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception -- Quantifying Covertness in Deceptive Cyber Deception -- Design Considerations for Building Cyber Deception Systems -- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks -- Effective Cyber Deception -- Cyber-Deception and Attribution in Capture-the-Flag Exercises -- Deceiving Attackers by Creating a Virtual Attack Surface -- Embedded Honeypotting -- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks -- Exploring Malicious Hacker Forums -- Anonymity in an electronic Society: A Survey. |
Record Nr. | UNINA-9910255005903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Warfare : Building the Scientific Foundation / / edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (326 p.) |
Disciplina |
004
004.6 005.7 005.8 005.82 |
Collana | Advances in Information Security |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Application software Systems and Data Security Cryptology Computer Communication Networks Information Systems Applications (incl. Internet) |
ISBN | 3-319-14039-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cyber War Games -- Alternatives to Cyber Warfare: Deterrence and Assurance -- Identifying and Exploiting the Cyber High Ground with Botnets -- Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberfare -- Game-theoretic Foundations for the Strategic Use of Honeypots in Network Security -- Cyber Counterdeception: How to Detect Denial & Deception -- Automated Adversary Profiling -- Cyber Attribution: An Argumentation-Based Approach -- The Human Factor in Cybersecurity: Robust & Intelligent Defense -- CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War -- Active Discovery of Hidden Profiles in Social Networks using Malware -- A Survey of Community Detection Algorithms Based on Analysis-Intent -- Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks -- Graph Mining for Cyber Security -- Programming language theoretic security in the real world: a mirage or the future?. |
Record Nr. | UNINA-9910299252203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data-driven generation of policies / / Austin Parker [and three others] |
Autore | Parker Austin |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | New York : , : Springer, , 2014 |
Descrizione fisica | 1 online resource (x, 50 pages) : illustrations |
Disciplina |
004
005.55 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Computer algorithms
Artificial intelligence |
ISBN | 1-4939-0274-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction and Related Work -- Optimal State Change Attempts -- Different Kinds of Effect Estimators -- A Comparison with Planning under Uncertainty -- Experimental Evaluation -- Conclusions. |
Record Nr. | UNINA-9910298563603321 |
Parker Austin
![]() |
||
New York : , : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Handbook of Computational Approaches to Counterterrorism / / edited by V.S. Subrahmanian |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | New York, NY : , : Springer New York : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (579 p.) |
Disciplina |
363.325
363.325170285 |
Soggetto topico |
Artificial intelligence
Mathematical statistics Data mining Criminology Application software Artificial Intelligence Probability and Statistics in Computer Science Data Mining and Knowledge Discovery Criminology and Criminal Justice, general Computer Appl. in Social and Behavioral Sciences |
ISBN |
1-283-93402-7
1-4614-5311-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data and Data Acquisition -- Behavioral Models and Forecasting -- Terrorist Network Analysis -- Systems, Frameworks, and Case Studies -- New Directions. |
Record Nr. | UNINA-9910437585103321 |
New York, NY : , : Springer New York : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Moving Target Defense II : Application of Game Theory and Adversarial Modeling / / edited by Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, X. Sean Wang |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | New York, NY : , : Springer New York : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (209 p.) |
Disciplina | 005.8 |
Collana | Advances in Information Security |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Electrical engineering Data structures (Computer science) Systems and Data Security Computer Communication Networks Cryptology Communications Engineering, Networks Data Structures and Information Theory |
ISBN |
1-283-90973-1
1-4614-5416-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Game Theoretic Approaches to Attack Surface Shifting -- Security Games Applied to Real-World -- Adversarial Dynamics: The Conficker Case Study -- From Individual Decisions from Experience to Behavioral Game Theory -- Cyber Maneuver Against External Adversaries and Compromised Nodes -- Applying Self-shielding Dynamics to the Network Architecture -- Moving Target Defenses in the Helix Self-Regenerative Architecture -- Diversifying the Software Stack using Randomized NOP Insertion -- Practical Software Diversification Using In-Place Code Randomization. |
Record Nr. | UNINA-9910437600503321 |
New York, NY : , : Springer New York : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Search Theory : A Game Theoretic Perspective / / edited by Steve Alpern, Robbert Fokkink, Leszek Gąsieniec, Roy Lindelauf, V.S. Subrahmanian |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | New York, NY : , : Springer New York : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (299 p.) |
Disciplina | 519.3 |
Soggetto topico |
Computer science—Mathematics
Artificial intelligence Game theory Biomathematics Mathematics Social sciences Math Applications in Computer Science Artificial Intelligence Game Theory, Economics, Social and Behav. Sciences Mathematical and Computational Biology Mathematics in the Humanities and Social Sciences |
ISBN | 1-4614-6825-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Search Games: A review -- Search Games for an Immobile Hider -- Tools to manage Search Games on Lattices -- Network Coloring and Colored Coin Games -- Open Problems on Search Games -- Some Cinderella Ruckle Type Games -- The Cardinality of the Sets involved in Lattice Games -- Effective Search for a Naval Mine with Application to Distributed Failure Detection -- The Value of the Two Cable Ambush Game -- How to poison your mother-in-law and other caching problems -- Rendezvous Problem -- Deterministic Symmetric Rendezvous in Arbitrary Graphs -- Gathering asynchronous and oblivious robots on basic graph topologies -- Ten Open Problems in Rendezvous Search -- Interactions between searching predators and hidden prey -- A discrete search-ambush game with a silent predator -- A Model of Partnership Formation with Friction and Multiple Criteria -- Applications of search in Biology: some open problems. |
Record Nr. | UNINA-9910741168703321 |
New York, NY : , : Springer New York : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|