Coverart for item
The Resource Cyber warfare : building the scientific foundation, Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, editors

Cyber warfare : building the scientific foundation, Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, editors

Label
Cyber warfare : building the scientific foundation
Title
Cyber warfare
Title remainder
building the scientific foundation
Statement of responsibility
Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, editors
Contributor
Editor
Subject
Language
eng
Summary
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference
Member of
Cataloging source
YDXCP
Illustrations
illustrations
Index
no index present
LC call number
QA76.9.A25
LC item number
C94 2015
Literary form
non fiction
Nature of contents
bibliography
Series statement
Advances in information security,
Series volume
volume 56
Cyber warfare : building the scientific foundation, Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, editors
Label
Cyber warfare : building the scientific foundation, Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, editors
Publication
Copyright
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Related Items
Bibliography note
Includes bibliographical references
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Cyber war games: strategic jostling among traditional adversaries / Sanjay Goel and Yuan Hong -- Alternatives to cyber warfare: deterrence and assurance / Robert J. Elder, Alexander H. Levis and Bahram Yousefi -- Identifying and exploiting the cyber high ground for botnets / Patrick Sweeney and George Cybenko -- Attribution, temptation, and expectation: a formal framework for defense-by-deception in cyberwarfare / Ehab Al-Shaer and Mohammad Ashiqur Rahman -- Game-theoretic foundations for the strategic use of honeypots in network security / Christopher Kiekintveld, Viliam Lisý and Radek Píbil -- Cyber counterdeception: how to detect denial & deception (D&D) / Kristin E. Heckman and Frank J. Stech -- Automated adversary profiling / Samuel N. Hamilton -- Cyber attribution: an argumentation-based approach / Paulo Shakarian, Gerardo I. Simari, Geoffrey Moores and Simon Parsons -- The human factor in cybersecurity: robust & intelligent defense / Julie L. Marble, W.F. Lawless, Ranjeev Mittu, Joseph Coyne, Myriam Abramson and Ciara Sibley -- CyberWar game: a paradigm for understanding new challenges of cyber war / Noam Ben-Asher and Cleotilde Gonzalez -- Active discovery of hidden profiles in social networks using malware / Rami Puzis and Yuval Elovici -- A survey of community detection algorithms based on analysis-intent / Napoleon C. Paxton, Stephen Russell, Ira S. Moskowitz and Paul Hyden -- Understanding the vulnerability lifecycle for risk assessment and defense against sophisticated cyber attacks / Tudor Dumitraş -- Graph mining for cyber security / B. Aditya Prakash -- Programming language theoretic security in the real world: a mirage of the future? / Andrew Ruef and Chris Rohlf
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9783319140384&userID=ebsco-test&password=ebsco-test
Dimensions
24 cm.
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b3772399'}
Extent
xiii, 321 pages
Isbn
9783319140384
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
System control number
(OCoLC)895337834

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...