| 000 | 00000nam u2200205 a 4500 | |
| 001 | 000046008782 | |
| 005 | 20191212131908 | |
| 008 | 191210s2019 enka b 001 0 eng d | |
| 020 | ▼a 9781785616389 | |
| 020 | ▼a 9781785616396 (PDF) | |
| 040 | ▼a 211009 ▼c 211009 ▼d 211009 | |
| 082 | 0 4 | ▼a 006.38 ▼2 23 |
| 084 | ▼a 006.38 ▼2 DDCK | |
| 090 | ▼a 006.38 ▼b N285 | |
| 245 | 0 0 | ▼a Nature-inspired cyber security and resiliency : ▼b fundamentals, techniques and applications / ▼c edited by El-Sayed M. El-Alfy ... [et al.]. |
| 260 | ▼a London : ▼b The Institution of Engineering and Technology, ▼c c2019. | |
| 300 | ▼a xxiv, 454 p. : ▼b ill. ; ▼c 25 cm. | |
| 490 | 1 | ▼a IET security series ; ▼v 10 |
| 504 | ▼a Includes bibliographical references and index. | |
| 650 | 0 | ▼a Biomimetics. |
| 650 | 0 | ▼a Computer security. |
| 650 | 0 | ▼a biomimetics. |
| 650 | 0 | ▼a fault tolerant computing. |
| 650 | 0 | ▼a security of data. |
| 650 | 0 | ▼a trusted computing. |
| 700 | 1 | ▼a El-Alfy, El-Sayed M. |
| 830 | 0 | ▼a IET security series ; ▼v 10. |
| 945 | ▼a KLPA |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 006.38 N285 | 등록번호 121251421 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative computing, and virtual and mixed reality environments. Maintaining their security, trustworthiness and resilience to cyber-attacks has become crucial which requires innovative and creative cyber security and resiliency solutions. Computing algorithms have been developed to mimic the operation of natural processes, phenomena and organisms such as artificial neural networks, swarm intelligence, deep learning systems, biomimicry, and more. The amazing characteristics of these systems offer a plethora of novel methodologies and opportunities to cope with emerging cyber challenges.
This edited book presents a timely review of the fundamentals, latest developments and diverse applications of nature-inspired algorithms in cyber security and resiliency. Topics include bio-inspired collaboration and cyber security; immune-based defense and resiliency; bio-inspired security and resiliency of network traffic; nature inspired machine learning approach for cyber security; nature-inspired algorithms in A.I. for malicious activity detection; DNA-inspired characterization and detection of novel social Twitter spambots; nature-inspired approaches for social network security; bio-inspired cyber-security for smart grid; nature-inspired cryptography and cryptanalysis, and more.
정보제공 :
목차
Chapter 1: Nature-inspired analogies and metaphors for cyber security Chapter 2: When to turn to nature-inspired solutions for cyber systems Chapter 3: Bioinspired collaboration and cyber security Chapter 4: Immune-based defence and resiliency Chapter 5: Bio-inspired approaches for security and resiliency of network traffic Chapter 6: Security and resilience for network traffic through nature-inspired approaches Chapter 7: Towards nature-inspired machine-learning approach for cyber security Chapter 8: Artificial intelligence and data analytics for encrypted traffic classification on anonymity networks Chapter 9: Bio/nature-inspired algorithms in A.I. for malicious activity detection Chapter 10: DNA-inspired characterization and detection of novel social Twitter spambots Chapter 11: Nature-inspired approaches for social network security Chapter 12: Software diversity for cyber resilience: percolation theoretic approach Chapter 13: Hunting bugs with nature-inspired fuzzing Chapter 14: Bio-inspired cyber-security for the smart grid Chapter 15: Nature-inspired cryptography and cryptanalysis Chapter 16: Generation of access-control schemes in computer networks based on genetic algorithms
