top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 289 p. 68 illus., 59 illus. in color.)
Disciplina 005.8
Soggetto topico Computer security
Artificial intelligence
Computer communication systems
Systems and Data Security
Artificial Intelligence
Computer Communication Networks
ISBN 3-030-33432-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software.
Record Nr. UNINA-9910380755503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 289 p. 68 illus., 59 illus. in color.)
Disciplina 005.8
Soggetto topico Computer security
Artificial intelligence
Computer communication systems
Systems and Data Security
Artificial Intelligence
Computer Communication Networks
ISBN 3-030-33432-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software.
Record Nr. UNISA-996465351503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Deception [[electronic resource] ] : Building the Scientific Foundation / / edited by Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
Cyber Deception [[electronic resource] ] : Building the Scientific Foundation / / edited by Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (X, 312 p. 111 illus.)
Disciplina 005.8
Soggetto topico Computer security
Computer communication systems
Application software
Data encryption (Computer science)
Electrical engineering
Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Cryptology
Communications Engineering, Networks
ISBN 3-319-32699-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception -- Quantifying Covertness in Deceptive Cyber Deception -- Design Considerations for Building Cyber Deception Systems -- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks -- Effective Cyber Deception -- Cyber-Deception and Attribution in Capture-the-Flag Exercises -- Deceiving Attackers by Creating a Virtual Attack Surface -- Embedded Honeypotting -- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks -- Exploring Malicious Hacker Forums -- Anonymity in an electronic Society: A Survey.
Record Nr. UNINA-9910255005903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Warfare [[electronic resource] ] : Building the Scientific Foundation / / edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
Cyber Warfare [[electronic resource] ] : Building the Scientific Foundation / / edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (326 p.)
Disciplina 004
004.6
005.7
005.8
005.82
Collana Advances in Information Security
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Application software
Systems and Data Security
Cryptology
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-319-14039-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber War Games -- Alternatives to Cyber Warfare: Deterrence and Assurance -- Identifying and Exploiting the Cyber High Ground with Botnets -- Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberfare -- Game-theoretic Foundations for the Strategic Use of Honeypots in Network Security -- Cyber Counterdeception: How to Detect Denial & Deception -- Automated Adversary Profiling -- Cyber Attribution: An Argumentation-Based Approach -- The Human Factor in Cybersecurity: Robust & Intelligent Defense -- CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War -- Active Discovery of Hidden Profiles in Social Networks using Malware -- A Survey of Community Detection Algorithms Based on Analysis-Intent -- Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks -- Graph Mining for Cyber Security -- Programming language theoretic security in the real world: a mirage or the future?.
Record Nr. UNINA-9910299252203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data and Applications Security and Privacy XXX [[electronic resource] ] : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings / / edited by Silvio Ranise, Vipin Swarup
Data and Applications Security and Privacy XXX [[electronic resource] ] : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings / / edited by Silvio Ranise, Vipin Swarup
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XI, 365 p. 89 illus.)
Disciplina 025.04
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Information storage and retrieval
Computer security
Data encryption (Computer science)
Computers and civilization
Computers
Law and legislation
Information Storage and Retrieval
Systems and Data Security
Cryptology
Computers and Society
Legal Aspects of Computing
ISBN 3-319-41483-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mobile security and privacy -- Security and privacy in databases -- Access Control -- Protection and privacy of data and big data -- Security and privacy in social networks and collaborative systems -- Reasoning about security and its cost.
Record Nr. UNINA-9910484677003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data and Applications Security and Privacy XXX [[electronic resource] ] : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings / / edited by Silvio Ranise, Vipin Swarup
Data and Applications Security and Privacy XXX [[electronic resource] ] : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings / / edited by Silvio Ranise, Vipin Swarup
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XI, 365 p. 89 illus.)
Disciplina 025.04
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Information storage and retrieval
Computer security
Data encryption (Computer science)
Computers and civilization
Computers
Law and legislation
Information Storage and Retrieval
Systems and Data Security
Cryptology
Computers and Society
Legal Aspects of Computing
ISBN 3-319-41483-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mobile security and privacy -- Security and privacy in databases -- Access Control -- Protection and privacy of data and big data -- Security and privacy in social networks and collaborative systems -- Reasoning about security and its cost.
Record Nr. UNISA-996465955803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Moving Target Defense II [[electronic resource] ] : Application of Game Theory and Adversarial Modeling / / edited by Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, X. Sean Wang
Moving Target Defense II [[electronic resource] ] : Application of Game Theory and Adversarial Modeling / / edited by Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, X. Sean Wang
Edizione [1st ed. 2013.]
Pubbl/distr/stampa New York, NY : , : Springer New York : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (209 p.)
Disciplina 005.8
Collana Advances in Information Security
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Electrical engineering
Data structures (Computer science)
Systems and Data Security
Computer Communication Networks
Cryptology
Communications Engineering, Networks
Data Structures and Information Theory
ISBN 1-283-90973-1
1-4614-5416-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Game Theoretic Approaches to Attack Surface Shifting -- Security Games Applied to Real-World -- Adversarial Dynamics: The Conficker Case Study -- From Individual Decisions from Experience to Behavioral Game Theory -- Cyber Maneuver Against External Adversaries and Compromised Nodes -- Applying Self-shielding Dynamics to the Network Architecture -- Moving Target Defenses in the Helix Self-Regenerative Architecture -- Diversifying the Software Stack using Randomized NOP Insertion -- Practical Software Diversification Using In-Place Code Randomization.
Record Nr. UNINA-9910437600503321
New York, NY : , : Springer New York : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2003
Descrizione fisica 1 online resource (154 pages)
Collana ACM Conferences
Soggetto topico Electrical & Computer Engineering
Engineering & Applied Sciences
Telecommunications
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Proceedings of the 1st Association for Computing Machinery Workshop on Security of Ad Hoc and Sensor Networks
Record Nr. UNINA-9910375841003321
[Place of publication not identified], : ACM, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
SASN '04 : proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks : Washington, DC, USA, October 25, 2004 : co-located with CCS 2004
SASN '04 : proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks : Washington, DC, USA, October 25, 2004 : co-located with CCS 2004
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2004
Descrizione fisica 1 online resource (118 pages)
Collana ACM Conferences
Soggetto topico Electrical & Computer Engineering
Engineering & Applied Sciences
Telecommunications
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Security of Ad Hoc and Sensor Networks '04 : proceedings of the 2004 Association for Computing Machinery Workshop on Security of Ad Hoc and Sensor Networks : Washington, District of Columbia, United States of America, October 25, 2004 : co-located with Computer and Communications Security 2004
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
Record Nr. UNINA-9910375913503321
[Place of publication not identified], : ACM, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure Cloud Computing [[electronic resource] /] / edited by Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang
Secure Cloud Computing [[electronic resource] /] / edited by Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang
Edizione [1st ed. 2014.]
Pubbl/distr/stampa New York, NY : , : Springer New York : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (351 p.)
Disciplina 004
004.6
004.6782
005.7
Soggetto topico Computer security
Application software
Computer communication systems
Computers
Systems and Data Security
Information Systems Applications (incl. Internet)
Computer Communication Networks
Information Systems and Communication Service
ISBN 1-4614-9278-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Key Management Issues and Challenges in Cloud Services -- Costs and Security in Clouds -- Hardware-enhanced Security for Cloud Computing -- Cloud Computing Security: What Changes with Software-Defined Networking? -- Proof of Isolation for Cloud Storage -- Selective and Fine-Grained Access to Data in the Cloud -- Enabling Collaborative Data Authorization Between Enterprise Clouds -- Making Query Execution Over Encrypted Data Practical -- Privacy-preserving Keyword Search over Encrypted Data in Cloud Computing -- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing -- Secure Mission-Centric Operations in Cloud Computing -- Computational Decoys for Cloud Security -- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing -- Software Cruising: A New Technology for Building Concurrent Software Monitor -- Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud Systems.
Record Nr. UNINA-9910298573503321
New York, NY : , : Springer New York : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui