Network Science and Cybersecurity
Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories. This book examines new algorithms and tools, technology platforms and...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Dordrecht :
Springer,
2014.
|
Series: | Advances in information security.
|
Subjects: | |
Online Access: |
Full text (Wentworth users only) |
Local Note: | Ebook Library |
MARC
LEADER | 00000cam a2200000uu 4500 | ||
---|---|---|---|
001 | w1503626 | ||
005 | 20240610130842.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 130803s2014 ne o 000 0 eng d | ||
020 | |a 9781461475972 | ||
020 | |a 146147597X | ||
029 | 1 | |a DEBSZ |b 397591365 | |
029 | 1 | |a DKDLA |b 820120-katalog:000657158 | |
035 | |a (OCoLC)854975928 | ||
035 | |a (AUPeEL)1317452 | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d OCLCO |d OCLCQ |d DEBSZ |d CGU |d OCLCO |d UtOrBLW | ||
050 | 4 | |a QA76.9 .A25 | |
050 | 4 | |a QA76.9 .D35 | |
082 | 0 | 4 | |a 005.8 |
100 | 1 | |a Pino, Robinson E. |0 nb2013017669 | |
245 | 1 | 0 | |a Network Science and Cybersecurity |h [electronic resource]. |
264 | 1 | |a Dordrecht : |b Springer, |c 2014. | |
300 | |a 1 online resource (282 pages). | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in Information Security ; |v v.55 | |
500 | |a 3.2 Sensing Capability of Mobile Devices. | ||
504 | |a References6 Design of Neuromorphic Architectures with Memristors; 1 ... Introduction; 2 ... CMOS/Memristor Synapse Circuits; 2.1 Memristor Overview and Models; 2.2 Synapse Circuits; 3 ... Neural Logic Blocks; 4 ... CMHNN Topologies; 4.1 Perceptron Networks; 4.2 Reservoir Computing; 5 ... Conclusions; References; 7 Nanoelectronics and Hardware Security; 1 ... Introduction; 2 ... An Overview of Hardware Security; 2.1 Threats to Trust: IC Piracy and Counterfeiting; 2.1.1 Potential Countermeasures; 2.2 The Threat of Side-Channel Attacks; 2.2.1 Potential Countermeasures; 3 ... Memristive Devices and Circuits. | ||
505 | 0 | |a Preface; Contents; 1 Towards Fundamental Science of Cyber Security; 1 ... Introduction; 2 ... Defining the Science of Cyber Security; 3 ... Development of Intrusion Detection Tools; 4 ... Cyber Maneuver and Moving Target Defense; 5 ... Assessment of Network's Vulnerabilities and Risks; 6 ... Attack Detection and Prediction; 7 ... Threat Analysis and Cyber Wargaming; 8 ... Summary of the Cyber Science Problem Landscape; 9 ... Conclusions; References; 2 Bridging the Semantic Gap: Human Factors in Anomaly-Based Intrusion Detection Systems; 1 ... Introduction; 2 ... Anomaly IDS Implementations; 2.1 Categorical Outlier Detection. | |
505 | 8 | |a 2.2 Support Vector Machines2.3 Clustering and Density Estimation; 2.4 Hybrid Techniques; 2.5 Tree-Based Classifiers; 3 ... Anomaly IDSs ''in the wild'' and the Semantic Gap; 4 ... The Base-Rate Fallacy, Anomaly Detection, and Cost of Misclassification; 4.1 Cost Versus Threshold Tradeoffs; 5 ... Revisiting Tree-Based Anomaly Detectors; 6 ... Conclusion; A.x(118). Appendix A; References; 3 Recognizing Unexplained Behavior in Network Traffic; 1 ... Introduction; 2 ... Behavior Model; 2.1 Preliminaries; 2.2 Probabilistic Unexplained Behavior Model; 3 ... Properties; 3.1 Totally Unexplained Behaviors. | |
505 | 8 | |a 3.2 Partially Unexplained Behaviors4 ... Algorithms; 5 ... Experimental Results; 5.1 Experimental Setup; 5.2 Scalability Results; 5.3 Accuracy Results; 6 ... Conclusions; Acknowledgments; References; 4 Applying Cognitive Memory to CyberSecurity; 1 ... Introduction; 2 ... Architectural Overview; 3 ... Biometric Example; 4 ... Clustering of Data Example; 5 ... Adaptive Tracking, Virus Detection; 6 ... Hash Function; 7 ... Product Overview; 5 Understanding Cyber Warfare; 1 ... The Cyber Warfare Problem; 2 ... Tools of Cyber Warfare; 3 ... Situation Understanding; 4 ... Mental Models; 5 ... Supervisory Control in the Cyber Battle Space; Acknowledgments. | |
505 | 8 | |a 3.1 Analog Memristors and Write Time3.2 Discrete Memristors; 4 ... Memristive Physical Unclonable Functions; 4.1 Memristive Memory Based PUF Cell; 4.2 Lateral Switching PUF Cell; 5 ... SCA Mitigation via Memristive Crossbars; 6 ... Conclusions; References; 8 User Classification and Authentication for Mobile Device Based on Gesture Recognition; 1 ... Introduction; 2 ... Security Solutions of Mobile Device; 2.1 Conventional Security Solutions; 2.2 Biometrics Solutions; 2.3 Requirements of Mobile Device Security Solutions; 3 ... Why Use Gesture to Protect Your Smartphone; 3.1 Why Gesture is Unique. | |
520 | |a Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories. This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These attacks may not y. | ||
588 | |a Description based on print version record. | ||
590 | |a Ebook Library |b PDA | ||
650 | 4 | |a Computer networks |x Security measures. | |
650 | 4 | |a Computer security. | |
650 | 4 | |a Data protection. | |
650 | 4 | |a Internet |x Security measures. | |
650 | 0 | |a Computer science. |0 sh 89003285 | |
650 | 0 | |a Computer networks. |0 sh 85029513 | |
650 | 0 | |a Data protection. |0 sh 85035859 | |
650 | 0 | |a Data structures (Computer science) |0 sh 85035862 | |
650 | 0 | |a Data encryption (Computer science) |0 sh 94001524 | |
650 | 0 | |a Telecommunication. |0 sh 85133270 | |
655 | 7 | |a Electronic books. |2 lcgft | |
776 | 0 | 8 | |i Print version: |a Pino, Robinson E. |t Network Science and Cybersecurity. |d Dordrecht : Springer, ©2014 |z 9781461475965 |
830 | 0 | |a Advances in information security. |0 n 00006047 | |
951 | |a 1503626 | ||
999 | f | f | |i 146c173e-5524-57fa-9df7-31f937ab3406 |s 9eb810bf-992a-5142-b83e-26e5e4d261d2 |t 0 |
952 | f | f | |a Wentworth Institute of Technology |b Main Campus |c Wentworth Library |d Ebooks |t 0 |e Springer |h Other scheme |
856 | 4 | 0 | |t 0 |u https://ezproxywit.flo.org/login?qurl=https://dx.doi.org/10.1007/978-1-4614-7597-2 |y Full text (Wentworth users only) |