Guide to Vulnerability Analysis for Computer Networks and Systems 1st ed. 2018(Computer Communications and Networks) H XVI, 390
目次
Part I: Introduction and State of the Art Review of the State of the Art of Vulnerability Assessment Using Artificial Intelligence Saad Khan and Simon Parkinson A Survey of Machine Learning Algorithms and Their Application in Information Security Mark Stamp Part II: Vulnerability Assessment Frameworks Vulnerability Assessment of Cybersecurity for SCADA Systems Kyle Coffey, Leandros A. Maglaras, Richard Smith, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Stylianos Rallis, and Awais Yousaf A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection Alexandros Chrysikos and Stephen McGuire AI and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection Igor Kotenko, Elena Doynikova, Andrey Chechulin, and Andrey Fedorchenko Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications Steven Walker-Roberts and Mohammad Hammoudeh Part III: Applications of Artificial Intelligence Automated Planning of Administrative Tasks Using Historic Events: a File System Case Study Saad Khan and Simon Parkinson Defending Against Chained Cyber-Attacks by Adversarial Agents Vivin Paliath and Paulo Shakarian Vulnerability Detection and Analysis in Adversarial Deep Learning Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, and Renato Levy SOCIO-LENS: Spotting Unsolicited Callers Through Network Analysis Muhammad Ajmal Azad, Junaid Arshad, and Farhan Riaz Function Call Graphs Versus Machine Learning for Malware Detection Deebiga Rajeswaran, Fabio Di Troia, Thomas H. Austin, and Mark Stamp Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models Dhiviya Dhanasekar, Fabio Di Troia, Katerina Potika, and Mark Stamp Masquerade Detection on Mobile Devices Swathi Nambiar Kadala Manikoth, Fabio Di Troia, and Mark Stamp Identifying File Interaction Patterns in Ransomware Behaviour Liam Grant and Simon Parkinson Part IV: Visualisation A Framework for the Visualisation of Cyber Security Requirements and its Application in BPMN Bo Zhou, Curtis Maines, Stephen Tang, and Qi Shi Big Data and Cyber Security: A Visual Analytics Perspective Suvodeep Mazumdar and Jing Wang
カート
カートに商品は入っていません。