Network Science and Cybersecurity

Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories. This book examines new algorithms and tools, technology platforms and...

Full description

Saved in:
Bibliographic Details
Main Author: Pino, Robinson E.
Format: Electronic eBook
Language:English
Published: Dordrecht : Springer, 2014.
Series:Advances in information security.
Subjects:
Online Access: Full text (Wentworth users only)
Local Note:Ebook Library

MARC

LEADER 00000cam a2200000uu 4500
001 w1503626
005 20240610130842.0
006 m o d
007 cr |n|||||||||
008 130803s2014 ne o 000 0 eng d
020 |a 9781461475972 
020 |a 146147597X 
029 1 |a DEBSZ  |b 397591365 
029 1 |a DKDLA  |b 820120-katalog:000657158 
035 |a (OCoLC)854975928 
035 |a (AUPeEL)1317452 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCO  |d OCLCQ  |d DEBSZ  |d CGU  |d OCLCO  |d UtOrBLW 
050 4 |a QA76.9 .A25 
050 4 |a QA76.9 .D35 
082 0 4 |a 005.8 
100 1 |a Pino, Robinson E.  |0 nb2013017669 
245 1 0 |a Network Science and Cybersecurity  |h [electronic resource]. 
264 1 |a Dordrecht :  |b Springer,  |c 2014. 
300 |a 1 online resource (282 pages). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Advances in Information Security ;  |v v.55 
500 |a 3.2 Sensing Capability of Mobile Devices. 
504 |a References6 Design of Neuromorphic Architectures with Memristors; 1 ... Introduction; 2 ... CMOS/Memristor Synapse Circuits; 2.1 Memristor Overview and Models; 2.2 Synapse Circuits; 3 ... Neural Logic Blocks; 4 ... CMHNN Topologies; 4.1 Perceptron Networks; 4.2 Reservoir Computing; 5 ... Conclusions; References; 7 Nanoelectronics and Hardware Security; 1 ... Introduction; 2 ... An Overview of Hardware Security; 2.1 Threats to Trust: IC Piracy and Counterfeiting; 2.1.1 Potential Countermeasures; 2.2 The Threat of Side-Channel Attacks; 2.2.1 Potential Countermeasures; 3 ... Memristive Devices and Circuits. 
505 0 |a Preface; Contents; 1 Towards Fundamental Science of Cyber Security; 1 ... Introduction; 2 ... Defining the Science of Cyber Security; 3 ... Development of Intrusion Detection Tools; 4 ... Cyber Maneuver and Moving Target Defense; 5 ... Assessment of Network's Vulnerabilities and Risks; 6 ... Attack Detection and Prediction; 7 ... Threat Analysis and Cyber Wargaming; 8 ... Summary of the Cyber Science Problem Landscape; 9 ... Conclusions; References; 2 Bridging the Semantic Gap: Human Factors in Anomaly-Based Intrusion Detection Systems; 1 ... Introduction; 2 ... Anomaly IDS Implementations; 2.1 Categorical Outlier Detection. 
505 8 |a 2.2 Support Vector Machines2.3 Clustering and Density Estimation; 2.4 Hybrid Techniques; 2.5 Tree-Based Classifiers; 3 ... Anomaly IDSs ''in the wild'' and the Semantic Gap; 4 ... The Base-Rate Fallacy, Anomaly Detection, and Cost of Misclassification; 4.1 Cost Versus Threshold Tradeoffs; 5 ... Revisiting Tree-Based Anomaly Detectors; 6 ... Conclusion; A.x(118). Appendix A; References; 3 Recognizing Unexplained Behavior in Network Traffic; 1 ... Introduction; 2 ... Behavior Model; 2.1 Preliminaries; 2.2 Probabilistic Unexplained Behavior Model; 3 ... Properties; 3.1 Totally Unexplained Behaviors. 
505 8 |a 3.2 Partially Unexplained Behaviors4 ... Algorithms; 5 ... Experimental Results; 5.1 Experimental Setup; 5.2 Scalability Results; 5.3 Accuracy Results; 6 ... Conclusions; Acknowledgments; References; 4 Applying Cognitive Memory to CyberSecurity; 1 ... Introduction; 2 ... Architectural Overview; 3 ... Biometric Example; 4 ... Clustering of Data Example; 5 ... Adaptive Tracking, Virus Detection; 6 ... Hash Function; 7 ... Product Overview; 5 Understanding Cyber Warfare; 1 ... The Cyber Warfare Problem; 2 ... Tools of Cyber Warfare; 3 ... Situation Understanding; 4 ... Mental Models; 5 ... Supervisory Control in the Cyber Battle Space; Acknowledgments. 
505 8 |a 3.1 Analog Memristors and Write Time3.2 Discrete Memristors; 4 ... Memristive Physical Unclonable Functions; 4.1 Memristive Memory Based PUF Cell; 4.2 Lateral Switching PUF Cell; 5 ... SCA Mitigation via Memristive Crossbars; 6 ... Conclusions; References; 8 User Classification and Authentication for Mobile Device Based on Gesture Recognition; 1 ... Introduction; 2 ... Security Solutions of Mobile Device; 2.1 Conventional Security Solutions; 2.2 Biometrics Solutions; 2.3 Requirements of Mobile Device Security Solutions; 3 ... Why Use Gesture to Protect Your Smartphone; 3.1 Why Gesture is Unique. 
520 |a Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories. This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These attacks may not y. 
588 |a Description based on print version record. 
590 |a Ebook Library  |b PDA 
650 4 |a Computer networks  |x Security measures. 
650 4 |a Computer security. 
650 4 |a Data protection. 
650 4 |a Internet  |x Security measures. 
650 0 |a Computer science.  |0 sh 89003285  
650 0 |a Computer networks.  |0 sh 85029513  
650 0 |a Data protection.  |0 sh 85035859  
650 0 |a Data structures (Computer science)  |0 sh 85035862  
650 0 |a Data encryption (Computer science)  |0 sh 94001524  
650 0 |a Telecommunication.  |0 sh 85133270  
655 7 |a Electronic books.  |2 lcgft 
776 0 8 |i Print version:  |a Pino, Robinson E.  |t Network Science and Cybersecurity.  |d Dordrecht : Springer, ©2014  |z 9781461475965 
830 0 |a Advances in information security.  |0 n 00006047  
951 |a 1503626 
999 f f |i 146c173e-5524-57fa-9df7-31f937ab3406  |s 9eb810bf-992a-5142-b83e-26e5e4d261d2  |t 0 
952 f f |a Wentworth Institute of Technology  |b Main Campus  |c Wentworth Library  |d Ebooks  |t 0  |e Springer  |h Other scheme 
856 4 0 |t 0  |u https://ezproxywit.flo.org/login?qurl=https://dx.doi.org/10.1007/978-1-4614-7597-2  |y Full text (Wentworth users only)