top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 289 p. 68 illus., 59 illus. in color.)
Disciplina 005.8
Soggetto topico Computer security
Artificial intelligence
Computer communication systems
Systems and Data Security
Artificial Intelligence
Computer Communication Networks
ISBN 3-030-33432-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software.
Record Nr. UNISA-996465351503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Adaptive Autonomous Secure Cyber Systems / / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Adaptive Autonomous Secure Cyber Systems / / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 289 p. 68 illus., 59 illus. in color.)
Disciplina 005.8
Soggetto topico Computer security
Artificial intelligence
Computer communication systems
Systems and Data Security
Artificial Intelligence
Computer Communication Networks
ISBN 3-030-33432-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software.
Record Nr. UNINA-9910380755503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Deception : Building the Scientific Foundation / / edited by Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
Cyber Deception : Building the Scientific Foundation / / edited by Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (X, 312 p. 111 illus.)
Disciplina 005.8
Soggetto topico Computer security
Computer communication systems
Application software
Data encryption (Computer science)
Electrical engineering
Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Cryptology
Communications Engineering, Networks
ISBN 3-319-32699-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception -- Quantifying Covertness in Deceptive Cyber Deception -- Design Considerations for Building Cyber Deception Systems -- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks -- Effective Cyber Deception -- Cyber-Deception and Attribution in Capture-the-Flag Exercises -- Deceiving Attackers by Creating a Virtual Attack Surface -- Embedded Honeypotting -- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks -- Exploring Malicious Hacker Forums -- Anonymity in an electronic Society: A Survey.
Record Nr. UNINA-9910255005903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Warfare : Building the Scientific Foundation / / edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
Cyber Warfare : Building the Scientific Foundation / / edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (326 p.)
Disciplina 004
004.6
005.7
005.8
005.82
Collana Advances in Information Security
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Application software
Systems and Data Security
Cryptology
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-319-14039-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber War Games -- Alternatives to Cyber Warfare: Deterrence and Assurance -- Identifying and Exploiting the Cyber High Ground with Botnets -- Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberfare -- Game-theoretic Foundations for the Strategic Use of Honeypots in Network Security -- Cyber Counterdeception: How to Detect Denial & Deception -- Automated Adversary Profiling -- Cyber Attribution: An Argumentation-Based Approach -- The Human Factor in Cybersecurity: Robust & Intelligent Defense -- CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War -- Active Discovery of Hidden Profiles in Social Networks using Malware -- A Survey of Community Detection Algorithms Based on Analysis-Intent -- Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks -- Graph Mining for Cyber Security -- Programming language theoretic security in the real world: a mirage or the future?.
Record Nr. UNINA-9910299252203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data-driven generation of policies / / Austin Parker [and three others]
Data-driven generation of policies / / Austin Parker [and three others]
Autore Parker Austin
Edizione [1st ed. 2014.]
Pubbl/distr/stampa New York : , : Springer, , 2014
Descrizione fisica 1 online resource (x, 50 pages) : illustrations
Disciplina 004
005.55
Collana SpringerBriefs in Computer Science
Soggetto topico Computer algorithms
Artificial intelligence
ISBN 1-4939-0274-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction and Related Work -- Optimal State Change Attempts -- Different Kinds of Effect Estimators -- A Comparison with Planning under Uncertainty -- Experimental Evaluation -- Conclusions.
Record Nr. UNINA-9910298563603321
Parker Austin  
New York : , : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of Computational Approaches to Counterterrorism / / edited by V.S. Subrahmanian
Handbook of Computational Approaches to Counterterrorism / / edited by V.S. Subrahmanian
Edizione [1st ed. 2013.]
Pubbl/distr/stampa New York, NY : , : Springer New York : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (579 p.)
Disciplina 363.325
363.325170285
Soggetto topico Artificial intelligence
Mathematical statistics
Data mining
Criminology
Application software
Artificial Intelligence
Probability and Statistics in Computer Science
Data Mining and Knowledge Discovery
Criminology and Criminal Justice, general
Computer Appl. in Social and Behavioral Sciences
ISBN 1-283-93402-7
1-4614-5311-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data and Data Acquisition -- Behavioral Models and Forecasting -- Terrorist Network Analysis -- Systems, Frameworks, and Case Studies -- New Directions.
Record Nr. UNINA-9910437585103321
New York, NY : , : Springer New York : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Moving Target Defense II : Application of Game Theory and Adversarial Modeling / / edited by Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, X. Sean Wang
Moving Target Defense II : Application of Game Theory and Adversarial Modeling / / edited by Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, X. Sean Wang
Edizione [1st ed. 2013.]
Pubbl/distr/stampa New York, NY : , : Springer New York : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (209 p.)
Disciplina 005.8
Collana Advances in Information Security
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Electrical engineering
Data structures (Computer science)
Systems and Data Security
Computer Communication Networks
Cryptology
Communications Engineering, Networks
Data Structures and Information Theory
ISBN 1-283-90973-1
1-4614-5416-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Game Theoretic Approaches to Attack Surface Shifting -- Security Games Applied to Real-World -- Adversarial Dynamics: The Conficker Case Study -- From Individual Decisions from Experience to Behavioral Game Theory -- Cyber Maneuver Against External Adversaries and Compromised Nodes -- Applying Self-shielding Dynamics to the Network Architecture -- Moving Target Defenses in the Helix Self-Regenerative Architecture -- Diversifying the Software Stack using Randomized NOP Insertion -- Practical Software Diversification Using In-Place Code Randomization.
Record Nr. UNINA-9910437600503321
New York, NY : , : Springer New York : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Search Theory : A Game Theoretic Perspective / / edited by Steve Alpern, Robbert Fokkink, Leszek Gąsieniec, Roy Lindelauf, V.S. Subrahmanian
Search Theory : A Game Theoretic Perspective / / edited by Steve Alpern, Robbert Fokkink, Leszek Gąsieniec, Roy Lindelauf, V.S. Subrahmanian
Edizione [1st ed. 2013.]
Pubbl/distr/stampa New York, NY : , : Springer New York : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (299 p.)
Disciplina 519.3
Soggetto topico Computer science—Mathematics
Artificial intelligence
Game theory
Biomathematics
Mathematics
Social sciences
Math Applications in Computer Science
Artificial Intelligence
Game Theory, Economics, Social and Behav. Sciences
Mathematical and Computational Biology
Mathematics in the Humanities and Social Sciences
ISBN 1-4614-6825-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Search Games: A review -- Search Games for an Immobile Hider -- Tools to manage Search Games on Lattices -- Network Coloring and Colored Coin Games -- Open Problems on Search Games -- Some Cinderella Ruckle Type Games -- The Cardinality of the Sets involved in Lattice Games -- Effective Search for a Naval Mine with Application to Distributed Failure Detection -- The Value of the Two Cable Ambush Game -- How to poison your mother-in-law and other caching problems -- Rendezvous Problem -- Deterministic Symmetric Rendezvous in Arbitrary Graphs -- Gathering asynchronous and oblivious robots on basic graph topologies -- Ten Open Problems in Rendezvous Search -- Interactions between searching predators and hidden prey -- A discrete search-ambush game with a silent predator -- A Model of Partnership Formation with Friction and Multiple Criteria -- Applications of search in Biology: some open problems.
Record Nr. UNINA-9910741168703321
New York, NY : , : Springer New York : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui