Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (X, 289 p. 68 illus., 59 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Systems and Data Security Artificial Intelligence Computer Communication Networks |
ISBN | 3-030-33432-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software. |
Record Nr. | UNINA-9910380755503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (X, 289 p. 68 illus., 59 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Systems and Data Security Artificial Intelligence Computer Communication Networks |
ISBN | 3-030-33432-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software. |
Record Nr. | UNISA-996465351503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Deception [[electronic resource] ] : Building the Scientific Foundation / / edited by Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (X, 312 p. 111 illus.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computer communication systems Application software Data encryption (Computer science) Electrical engineering Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Cryptology Communications Engineering, Networks |
ISBN | 3-319-32699-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception -- Quantifying Covertness in Deceptive Cyber Deception -- Design Considerations for Building Cyber Deception Systems -- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks -- Effective Cyber Deception -- Cyber-Deception and Attribution in Capture-the-Flag Exercises -- Deceiving Attackers by Creating a Virtual Attack Surface -- Embedded Honeypotting -- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks -- Exploring Malicious Hacker Forums -- Anonymity in an electronic Society: A Survey. |
Record Nr. | UNINA-9910255005903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Warfare [[electronic resource] ] : Building the Scientific Foundation / / edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (326 p.) |
Disciplina |
004
004.6 005.7 005.8 005.82 |
Collana | Advances in Information Security |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Application software Systems and Data Security Cryptology Computer Communication Networks Information Systems Applications (incl. Internet) |
ISBN | 3-319-14039-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cyber War Games -- Alternatives to Cyber Warfare: Deterrence and Assurance -- Identifying and Exploiting the Cyber High Ground with Botnets -- Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberfare -- Game-theoretic Foundations for the Strategic Use of Honeypots in Network Security -- Cyber Counterdeception: How to Detect Denial & Deception -- Automated Adversary Profiling -- Cyber Attribution: An Argumentation-Based Approach -- The Human Factor in Cybersecurity: Robust & Intelligent Defense -- CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War -- Active Discovery of Hidden Profiles in Social Networks using Malware -- A Survey of Community Detection Algorithms Based on Analysis-Intent -- Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks -- Graph Mining for Cyber Security -- Programming language theoretic security in the real world: a mirage or the future?. |
Record Nr. | UNINA-9910299252203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data and Applications Security and Privacy XXX [[electronic resource] ] : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings / / edited by Silvio Ranise, Vipin Swarup |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XI, 365 p. 89 illus.) |
Disciplina | 025.04 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Information storage and retrieval
Computer security Data encryption (Computer science) Computers and civilization Computers Law and legislation Information Storage and Retrieval Systems and Data Security Cryptology Computers and Society Legal Aspects of Computing |
ISBN | 3-319-41483-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Mobile security and privacy -- Security and privacy in databases -- Access Control -- Protection and privacy of data and big data -- Security and privacy in social networks and collaborative systems -- Reasoning about security and its cost. |
Record Nr. | UNINA-9910484677003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data and Applications Security and Privacy XXX [[electronic resource] ] : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings / / edited by Silvio Ranise, Vipin Swarup |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XI, 365 p. 89 illus.) |
Disciplina | 025.04 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Information storage and retrieval
Computer security Data encryption (Computer science) Computers and civilization Computers Law and legislation Information Storage and Retrieval Systems and Data Security Cryptology Computers and Society Legal Aspects of Computing |
ISBN | 3-319-41483-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Mobile security and privacy -- Security and privacy in databases -- Access Control -- Protection and privacy of data and big data -- Security and privacy in social networks and collaborative systems -- Reasoning about security and its cost. |
Record Nr. | UNISA-996465955803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Moving Target Defense II [[electronic resource] ] : Application of Game Theory and Adversarial Modeling / / edited by Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, X. Sean Wang |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | New York, NY : , : Springer New York : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (209 p.) |
Disciplina | 005.8 |
Collana | Advances in Information Security |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Electrical engineering Data structures (Computer science) Systems and Data Security Computer Communication Networks Cryptology Communications Engineering, Networks Data Structures and Information Theory |
ISBN |
1-283-90973-1
1-4614-5416-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Game Theoretic Approaches to Attack Surface Shifting -- Security Games Applied to Real-World -- Adversarial Dynamics: The Conficker Case Study -- From Individual Decisions from Experience to Behavioral Game Theory -- Cyber Maneuver Against External Adversaries and Compromised Nodes -- Applying Self-shielding Dynamics to the Network Architecture -- Moving Target Defenses in the Helix Self-Regenerative Architecture -- Diversifying the Software Stack using Randomized NOP Insertion -- Practical Software Diversification Using In-Place Code Randomization. |
Record Nr. | UNINA-9910437600503321 |
New York, NY : , : Springer New York : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2003 |
Descrizione fisica | 1 online resource (154 pages) |
Collana | ACM Conferences |
Soggetto topico |
Electrical & Computer Engineering
Engineering & Applied Sciences Telecommunications |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Proceedings of the 1st Association for Computing Machinery Workshop on Security of Ad Hoc and Sensor Networks |
Record Nr. | UNINA-9910375841003321 |
[Place of publication not identified], : ACM, 2003 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
SASN '04 : proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks : Washington, DC, USA, October 25, 2004 : co-located with CCS 2004 |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2004 |
Descrizione fisica | 1 online resource (118 pages) |
Collana | ACM Conferences |
Soggetto topico |
Electrical & Computer Engineering
Engineering & Applied Sciences Telecommunications |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Security of Ad Hoc and Sensor Networks '04 : proceedings of the 2004 Association for Computing Machinery Workshop on Security of Ad Hoc and Sensor Networks : Washington, District of Columbia, United States of America, October 25, 2004 : co-located with Computer and Communications Security 2004
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks |
Record Nr. | UNINA-9910375913503321 |
[Place of publication not identified], : ACM, 2004 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Secure Cloud Computing [[electronic resource] /] / edited by Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | New York, NY : , : Springer New York : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (351 p.) |
Disciplina |
004
004.6 004.6782 005.7 |
Soggetto topico |
Computer security
Application software Computer communication systems Computers Systems and Data Security Information Systems Applications (incl. Internet) Computer Communication Networks Information Systems and Communication Service |
ISBN | 1-4614-9278-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptographic Key Management Issues and Challenges in Cloud Services -- Costs and Security in Clouds -- Hardware-enhanced Security for Cloud Computing -- Cloud Computing Security: What Changes with Software-Defined Networking? -- Proof of Isolation for Cloud Storage -- Selective and Fine-Grained Access to Data in the Cloud -- Enabling Collaborative Data Authorization Between Enterprise Clouds -- Making Query Execution Over Encrypted Data Practical -- Privacy-preserving Keyword Search over Encrypted Data in Cloud Computing -- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing -- Secure Mission-Centric Operations in Cloud Computing -- Computational Decoys for Cloud Security -- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing -- Software Cruising: A New Technology for Building Concurrent Software Monitor -- Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud Systems. |
Record Nr. | UNINA-9910298573503321 |
New York, NY : , : Springer New York : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|