Cantitate/Preț
Produs

Adaptive Autonomous Secure Cyber Systems

Editat de Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
en Limba Engleză Paperback – 5 feb 2021
This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include:

  • Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations;

  • The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate;

  • On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require;

  • Human understanding and control of highly distributed autonomous cyber defenses;

  • Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system.

This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment.

Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security.

This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 101883 lei  43-57 zile
  Springer International Publishing – 5 feb 2021 101883 lei  43-57 zile
Hardback (1) 102988 lei  43-57 zile
  Springer International Publishing – 5 feb 2020 102988 lei  43-57 zile

Preț: 101883 lei

Preț vechi: 127353 lei
-20% Nou

Puncte Express: 1528

Preț estimativ în valută:
19498 20254$ 16196£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030334345
ISBN-10: 3030334341
Ilustrații: X, 289 p. 68 illus., 59 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.46 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland

Cuprins

1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems.- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges.- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense.- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint.- 5. A framework for studying autonomic computing models in cyber deception.- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis.- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions.- 8. Plan Interdiction Games.- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance.- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense.- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies.- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains.- 13. An Empirical Study of Secret Security Patch in Open Source Software.

Notă biografică

Sushil Jajodia is University Professor, BDM International Professor, and the founding director of Center for Secure Information Systems in the Volgenau School of Engineering at the George Mason University, Fairfax, Virginia. His research interests include security, privacy, databases, and distributed systems. He has authored or coauthored seven books, edited 43 books and conference proceedings, and published more than 450 technical papers in the refereed journals and conference proceedings. He is also a holder of seventeen patents.

George Cybenko is the Dorothy and Walter Gramm Professor of Engineering at Dartmouth. Professor Cybenko has made key research contributions in signal processing, neural computing, parallel processing and computational behavioral analysis. He was the Founding Editor-in-Chief of IEEE/AIP Computing in Science and Engineering and IEEE Security & Privacy. Professor Cybenko is a Fellow of the IEEE and received his BS (University of Toronto) and PhD (Princeton) degrees in Mathematics.

V.S. Subrahmanian is The Dartmouth College Distinguished Professor in Cybersecurity, Technology, and Society at Dartmouth College.  Prof. Subrahmanian is one of the world leaders in logical reasoning with uncertainty, probabilistic logics, temporal probabilistic logics, and managing huge, heterogeneous databases with incomplete and inconsistent information, and multimedia databases.  He serves on the boards of numerous journals including Science, ACM Transactions on Intelligent Systems & Technology, ACM Transactions on Computational Logic, and IEEE Transactions on Computational Social Systems.

Vipin Swarup is director of the Cyber Resilient Systems at the MITRE Corporation, McLean, VA.  He is the recipient of MITRE’s first Technology Transfer Individual Contribution Award for entrepreneurial leadership and success in transferring MITRE innovations to the government and industry. In the past, he has led many research projects as principal investigator and has published extensively in the cybersecurity literature. He holds a B.Tech. in Computer Science and Engineering from Indian Institute of Technology, Bombay, and an MS and Ph.D. in Computer Science from the University of Illinois at Urbana-Champaign.
 
Cliff Wang graduated from North Carolina State University with a Ph.D. in computer engineering in 1996.  He has been carrying out research in the area of computer vision, medical imaging, high speed networks, and most recently information security. He has authored around 40 technical papers and 3 Internet standards RFCs. Dr. Wang also served as an editor for nine books and hold three US patents on information security system development. Since 2003, Dr. Wang has been managing extramural research portfolio on information assurance at U.S. Army Research Office. In 2007 he was selected as the director of the computing sciences division at ARO while in the same time managing his program. Dr. Wang also holds adjunct faculty position at both Department of Computer Science and Department of Electrical and Computer Engineering at North Carolina State University.

Michael Wellman is Professor of Computer Science & Engineering at the University of Michigan. He received a PhD from the Massachusetts Institute of Technology in 1988 for his work in qualitative probabilistic reasoning and decision-theoretic planning. From 1988 to 1992, Wellman conducted research in these areas at the USAF’s Wright Laboratory. For the past 25 years, his research has focused on computational market mechanisms and game-theoretic reasoning methods, with applications in electronic commerce, finance, and cyber-security. As Chief Market Technologist for TradingDynamics, Inc., he designed configurable auction technology for dynamic business-to-business commerce. Wellman previously served as Chair of the ACM Special Interest Group on Electronic Commerce (SIGecom), and as Executive Editor of the Journal of Artificial Intelligence Research. He is a Fellow of the Association for the Advancement of Artificial Intelligence and the Association for Computing Machinery.

Textul de pe ultima copertă

This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include:

  • Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations;
  • The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate;
  • On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require;
  • Human understanding and control of highly distributed autonomous cyber defenses;
  • Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system.

This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment.

Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security.

This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.

Caracteristici

Presents the latest research on the attribution problem to help identify culprits of cyber-attacks
Describes how a variety of subfields of computer science are applied to cyber-security including artificial intelligence, game theory, programming languages, and graph theory
Features chapters by leading scientists in the cyber-security field