Télécharger le livre :  AI Embedded Assurance for Cyber Systems
Ajouter à ma liste d'envies
The rapid growth and reliance on cyber systems have permeated our society, government, and military which is demonstrated in this book.The authors discuss how AI-powered cyber systems are designed to protect against cyber threats and ensure the security and...

Editeur : Springer
Parution : 2023-12-12

PDF, ePub

147,69
Télécharger le livre :  Cyber Deception
Ajouter à ma liste d'envies
This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human...

Editeur : Springer
Parution : 2023-03-08
Collection : Advances in Information Security
PDF, ePub

158,24
Télécharger le livre :  Proactive and Dynamic Network Defense
Ajouter à ma liste d'envies
This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense.This book also presents the latest fundamental research results toward understanding proactive and...

Editeur : Springer
Parution : 2019-05-22
Collection : Advances in Information Security
PDF, ePub

137,14
Télécharger le livre :  Digital Fingerprinting
Ajouter à ma liste d'envies
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more.  Available techniques for assurance are...

Editeur : Springer
Parution : 2016-10-25

PDF, ePub

105,49
Télécharger le livre :  Cyber Deception
Ajouter à ma liste d'envies
This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in...

Editeur : Springer
Parution : 2016-07-15

PDF, ePub

168,79
Télécharger le livre :  Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
Ajouter à ma liste d'envies
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal...

Editeur : Springer
Parution : 2015-11-05
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Fundamentals of Sketch-Based Passwords
Ajouter à ma liste d'envies
This SpringerBrief explores graphical password systems and examines novel drawing-based methods in terms of security, usability, and human computer-interactions. It provides a systematic approach for recognizing, comparing, and matching sketch-based passwords in the...

Editeur : Springer
Parution : 2015-01-16
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Cyber Defense and Situational Awareness
Ajouter à ma liste d'envies
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber...

Editeur : Springer
Parution : 2015-01-05
Collection : Advances in Information Security
ePub

94,94
Télécharger le livre :  Introduction to Hardware Security and Trust
Ajouter à ma liste d'envies
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS,...

Editeur : Springer
Parution : 2011-09-22

ePub

116,04