Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (X, 289 p. 68 illus., 59 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Systems and Data Security Artificial Intelligence Computer Communication Networks |
ISBN | 3-030-33432-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software. |
Record Nr. | UNISA-996465351503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Adaptive Autonomous Secure Cyber Systems / / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (X, 289 p. 68 illus., 59 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Systems and Data Security Artificial Intelligence Computer Communication Networks |
ISBN | 3-030-33432-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software. |
Record Nr. | UNINA-9910380755503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense [[electronic resource] ] : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (VII, 263 p. 120 illus., 45 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer crimes
Computer organization Computers Mathematical statistics Computer Crime Computer Systems Organization and Communication Networks Computing Milieux Information Systems and Communication Service Probability and Statistics in Computer Science |
ISBN | 3-030-30719-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Overview of Control and Game Theory in Adaptive Cyber-Defenses -- Control Theoretic Approaches to Cyber-Security -- Game-Theoretic Approaches to Cyber-Security: Issues and Challenges and Results -- Reinforcement Learning for Adaptive Cyber Defense against Zero-day Attacks -- Moving Target Defense Quantification -- Empirical Game-Theoretic Methods for Adaptive Cyber-Defense -- MTD Techniques for Memory Protection against Zero-Day Attacks -- Adaptive Cyber Defenses for Botnet Detection and Mitigation -- Optimizing Alert Data Management Processes at a Cyber Security Operations Center -- Online and Scalable Adaptive Cyber Defense. |
Record Nr. | UNISA-996466448203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (VII, 263 p. 120 illus., 45 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer crimes
Computer organization Computers Mathematical statistics Computer Crime Computer Systems Organization and Communication Networks Computing Milieux Information Systems and Communication Service Probability and Statistics in Computer Science |
ISBN | 3-030-30719-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Overview of Control and Game Theory in Adaptive Cyber-Defenses -- Control Theoretic Approaches to Cyber-Security -- Game-Theoretic Approaches to Cyber-Security: Issues and Challenges and Results -- Reinforcement Learning for Adaptive Cyber Defense against Zero-day Attacks -- Moving Target Defense Quantification -- Empirical Game-Theoretic Methods for Adaptive Cyber-Defense -- MTD Techniques for Memory Protection against Zero-Day Attacks -- Adaptive Cyber Defenses for Botnet Detection and Mitigation -- Optimizing Alert Data Management Processes at a Cyber Security Operations Center -- Online and Scalable Adaptive Cyber Defense. |
Record Nr. | UNINA-9910349301503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 1st ACM Conference on Electronic Commerce |
Autore | Feldman Stuart |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 1999 |
Descrizione fisica | 1 online resource (187 pages) |
Collana | ACM Conferences |
Soggetto topico |
Commerce
Business & Economics Marketing & Sales |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Proceedings of the 1st Association for Computing Machinery Conference on Electronic Commerce
EC '99 ACM Conference on Electronic Commerce, Denver, CO, USA - November 03 - 05, 1999 |
Record Nr. | UNINA-9910376221103321 |
Feldman Stuart | ||
[Place of publication not identified], : ACM, 1999 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|