HOME > 상세정보

상세정보

Nature-inspired cyber security and resiliency : fundamentals, techniques and applications

Nature-inspired cyber security and resiliency : fundamentals, techniques and applications

자료유형
단행본
개인저자
El-Alfy, El-Sayed M.
서명 / 저자사항
Nature-inspired cyber security and resiliency : fundamentals, techniques and applications / edited by El-Sayed M. El-Alfy ... [et al.].
발행사항
London :   The Institution of Engineering and Technology,   c2019.  
형태사항
xxiv, 454 p. : ill. ; 25 cm.
총서사항
IET security series ;10
ISBN
9781785616389 9781785616396 (PDF)
서지주기
Includes bibliographical references and index.
일반주제명
Biomimetics. Computer security. biomimetics. fault tolerant computing. security of data. trusted computing.
000 00000nam u2200205 a 4500
001 000046008782
005 20191212131908
008 191210s2019 enka b 001 0 eng d
020 ▼a 9781785616389
020 ▼a 9781785616396 (PDF)
040 ▼a 211009 ▼c 211009 ▼d 211009
082 0 4 ▼a 006.38 ▼2 23
084 ▼a 006.38 ▼2 DDCK
090 ▼a 006.38 ▼b N285
245 0 0 ▼a Nature-inspired cyber security and resiliency : ▼b fundamentals, techniques and applications / ▼c edited by El-Sayed M. El-Alfy ... [et al.].
260 ▼a London : ▼b The Institution of Engineering and Technology, ▼c c2019.
300 ▼a xxiv, 454 p. : ▼b ill. ; ▼c 25 cm.
490 1 ▼a IET security series ; ▼v 10
504 ▼a Includes bibliographical references and index.
650 0 ▼a Biomimetics.
650 0 ▼a Computer security.
650 0 ▼a biomimetics.
650 0 ▼a fault tolerant computing.
650 0 ▼a security of data.
650 0 ▼a trusted computing.
700 1 ▼a El-Alfy, El-Sayed M.
830 0 ▼a IET security series ; ▼v 10.
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 006.38 N285 등록번호 121251421 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative computing, and virtual and mixed reality environments. Maintaining their security, trustworthiness and resilience to cyber-attacks has become crucial which requires innovative and creative cyber security and resiliency solutions. Computing algorithms have been developed to mimic the operation of natural processes, phenomena and organisms such as artificial neural networks, swarm intelligence, deep learning systems, biomimicry, and more. The amazing characteristics of these systems offer a plethora of novel methodologies and opportunities to cope with emerging cyber challenges.

This edited book presents a timely review of the fundamentals, latest developments and diverse applications of nature-inspired algorithms in cyber security and resiliency. Topics include bio-inspired collaboration and cyber security; immune-based defense and resiliency; bio-inspired security and resiliency of network traffic; nature inspired machine learning approach for cyber security; nature-inspired algorithms in A.I. for malicious activity detection; DNA-inspired characterization and detection of novel social Twitter spambots; nature-inspired approaches for social network security; bio-inspired cyber-security for smart grid; nature-inspired cryptography and cryptanalysis, and more.


정보제공 : Aladin

목차

Chapter 1: Nature-inspired analogies and metaphors for cyber security
Chapter 2: When to turn to nature-inspired solutions for cyber systems
Chapter 3: Bioinspired collaboration and cyber security
Chapter 4: Immune-based defence and resiliency
Chapter 5: Bio-inspired approaches for security and resiliency of network traffic
Chapter 6: Security and resilience for network traffic through nature-inspired approaches
Chapter 7: Towards nature-inspired machine-learning approach for cyber security
Chapter 8: Artificial intelligence and data analytics for encrypted traffic classification on anonymity networks
Chapter 9: Bio/nature-inspired algorithms in A.I. for malicious activity detection
Chapter 10: DNA-inspired characterization and detection of novel social Twitter spambots
Chapter 11: Nature-inspired approaches for social network security
Chapter 12: Software diversity for cyber resilience: percolation theoretic approach
Chapter 13: Hunting bugs with nature-inspired fuzzing
Chapter 14: Bio-inspired cyber-security for the smart grid
Chapter 15: Nature-inspired cryptography and cryptanalysis
Chapter 16: Generation of access-control schemes in computer networks based on genetic algorithms

관련분야 신착자료

Dyer-Witheford, Nick (2026)
양성봉 (2025)