Guide to vulnerability analysis for computer networks and systems : an artificial intelligence approach /: an artificial intelligence approach. (2018)
- Record Type:
- Book
- Title:
- Guide to vulnerability analysis for computer networks and systems : an artificial intelligence approach /: an artificial intelligence approach. (2018)
- Main Title:
- Guide to vulnerability analysis for computer networks and systems : an artificial intelligence approach
- Further Information:
- Note: Simon Parkinson, Andrew Crampton, Richard Hill, editors.
- Editors:
- Parkinson, Simon
Crampton, Andrew
Hill, Richard - Contents:
- Part I: Introduction and State of the Art Review of the State of the Art of Vulnerability Assessment Using Artificial Intelligence Saad Khan and Simon Parkinson A Survey of Machine Learning Algorithms and Their Application in Information Security Mark Stamp Part II: Vulnerability Assessment Frameworks Vulnerability Assessment of Cybersecurity for SCADA Systems Kyle Coffey, Leandros A. Maglaras, Richard Smith, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Stylianos Rallis, and Awais Yousaf A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection Alexandros Chrysikos and Stephen McGuire AI and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection Igor Kotenko, Elena Doynikova, Andrey Chechulin, and Andrey Fedorchenko Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications Steven Walker-Roberts and Mohammad Hammoudeh Part III: Applications of Artificial Intelligence Automated Planning of Administrative Tasks Using Historic Events: a File System Case Study Saad Khan and Simon Parkinson Defending Against Chained Cyber-Attacks by Adversarial Agents Vivin Paliath and Paulo Shakarian Vulnerability Detection and Analysis in Adversarial Deep Learning Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, and Renato Levy SOCIO-LENS: Spotting Unsolicited Callers Through Network Analysis Muhammad Ajmal Azad, JunaidPart I: Introduction and State of the Art Review of the State of the Art of Vulnerability Assessment Using Artificial Intelligence Saad Khan and Simon Parkinson A Survey of Machine Learning Algorithms and Their Application in Information Security Mark Stamp Part II: Vulnerability Assessment Frameworks Vulnerability Assessment of Cybersecurity for SCADA Systems Kyle Coffey, Leandros A. Maglaras, Richard Smith, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Stylianos Rallis, and Awais Yousaf A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection Alexandros Chrysikos and Stephen McGuire AI and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection Igor Kotenko, Elena Doynikova, Andrey Chechulin, and Andrey Fedorchenko Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications Steven Walker-Roberts and Mohammad Hammoudeh Part III: Applications of Artificial Intelligence Automated Planning of Administrative Tasks Using Historic Events: a File System Case Study Saad Khan and Simon Parkinson Defending Against Chained Cyber-Attacks by Adversarial Agents Vivin Paliath and Paulo Shakarian Vulnerability Detection and Analysis in Adversarial Deep Learning Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, and Renato Levy SOCIO-LENS: Spotting Unsolicited Callers Through Network Analysis Muhammad Ajmal Azad, Junaid Arshad, and Farhan Riaz Function Call Graphs Versus Machine Learning for Malware Detection Deebiga Rajeswaran, Fabio Di Troia, Thomas H. Austin, and Mark Stamp Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models Dhiviya Dhanasekar, Fabio Di Troia, Katerina Potika, and Mark Stamp Masquerade Detection on Mobile Devices Swathi Nambiar Kadala Manikoth, Fabio Di Troia, and Mark Stamp Identifying File Interaction Patterns in Ransomware Behaviour Liam Grant and Simon Parkinson Part IV: Visualisation A Framework for the Visualisation of Cyber Security Requirements and its Application in BPMN Bo Zhou, Curtis Maines, Stephen Tang, and Qi Shi Big Data and Cyber Security: A Visual Analytics Perspective Suvodeep Mazumdar and Jing Wang. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer science
Computer networks -- Security measures
Computer security
Artificial intelligence
COMPUTERS / Security / Networking
Computers -- Security -- General
Computers -- Hardware -- General
Computers -- Online Services -- General
Psychology -- Cognitive Psychology
Computer security
Systems analysis & design
Computer networking & communications
Cognition & cognitive psychology
Computer Communication Networks
Data protection
Operating systems (Computers)
Information systems
Consciousness
Computers -- Hardware -- Network Hardware
Network hardware
Electronic books - Languages:
- English
- ISBNs:
- 9783319926247
3319926241 - Related ISBNs:
- 9783319926230
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed September 17, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.324928
- Ingest File:
- 01_263.xml