खोजी परिणाम
-
Information Systems Security
This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015. The 24revised full papers and 8 short papers presented together with 4 invited paperswere carefully reviewed and selected from 133 ... थप
Language: ENGप्रतिलिपि अधिकार 2015 -
Encyclopedia of Cryptography and Security
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in m... थप
Language: ENGप्रतिलिपि अधिकार 2005 -
Graphical Models for Security
This volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, held in Verona, Italy, in July 2015. The 5 revised full papers presented together with one short tool paper and one invited lecture were c... थप
Language: ENGप्रतिलिपि अधिकार 2016 -
Network Hardening
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means ... थप
Language: ENGप्रतिलिपि अधिकार 2014 -
Theory and Models for Cyber Situation Awareness
Today, when a security incident happens, the top three questions a cyber operation center would ask are: What has happened? Why did it happen? What should I do? Answers to the first two questions form the core of Cyber Situation Awareness (SA). Whether the last question can be satisfactorily addres... थप
Language: ENGप्रतिलिपि अधिकार 2017 -
Network Security Metrics
This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since "you cannot improve w... थप
Language: ENGप्रतिलिपि अधिकार 2017 -
Cyber Deception: Building the Scientific Foundation
This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the comp... थप
Language: ENGप्रतिलिपि अधिकार 2016 -
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- and Game-Theoretic Approaches to Cyber Security (Lecture Notes in Computer Science #11830)
Today’s cyber defenses are largely static allowing adversaries to pre-plan their attacks. In response to this situation, researchers have started to investigate various methods that make networked information systems less homogeneous and less predictable by engineering systems that have homogeneous ... थप
Language: ENGप्रतिलिपि अधिकार 2019 -
Secure Cloud Computing
This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, f... थप
Language: ENGप्रतिलिपि अधिकार 2014 -
Cyber Warfare: Building the Scientific Foundation (Advances in Information Security #56)
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, pr... थप
Language: ENGप्रतिलिपि अधिकार 2015 -
Adaptive Autonomous Secure Cyber Systems
by Sushil Jajodia • Cliff Wang • V. S. Subrahmanian • Vipin Swarup • George Cybenko • Michael WellmanThis book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include:Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations;The extent to which autonomous cyber systems can be d... थप
Language: ENGप्रतिलिपि अधिकार 2020 -
Moving Target Defense II
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force advers... थप
Language: ENGप्रतिलिपि अधिकार 2013