MARC 닫기
00000cam c22002058c 4500
000005126932
20231029204312
ta
230904s2021 us b 001c0 eng
▼a 2021031984
▼a 9781119723929
▼q (hardback)
▼z 9781119723912
▼q (adobe pdf)
▼a (KERIS)REF000019691954
▼a DLC
▼b eng
▼c DLC
▼d 211070
▼a pcc
▼a TK5105.59
▼a TK5105.59
▼b K15
▼a Game theory and machine learning for cyber security /
▼d Charles A Kamhoua ,
▼e Christopher D Kiekintveld,
▼e Fei Fang,
▼e Quanyan Zhu
▼a Hoboken, New Jersey :
▼b John Wiley & Sons, Inc.,
▼c [2021]
▼a pages cm
▼a Includes bibliographical references and index
▼a Introduction to game theory / Fei Fang, Shutian Liu, Anjon Basak, Quanyan Zhu, Christopher Kiekintveld, Charles A. Kamhoua -- Scalable algorithms for identifying stealthy attackers in a game theoretic framework using deception / Anjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld -- Honeypot allocation game over attack graphs for cyber deception / Ahmed H. Anwar, Charles Kamhoua, Nandi Leslie, Christopher Kiekintveld.
▼a "Cyber security is a serious concern to our economic prosperity and national security. Despite an increased investment in cyber defense, cyber-attackers are becoming more creative and sophisticated. This exposes the need for a more rigorous approach to cyber security, including methods from artificial intelligence including computational game theory and machine learning. Recent advances in adversarial machine learning are promising to make artificial intelligence (AI) algorithms more robust to deception and intelligent manipulation. However, they are still vulnerable to adversarial inputs, data poisoning, model stealing and evasion attacks. The above challenges and the high risk and consequence of cyber-attacks drive the need to accelerate basic research on cyber security"--
▼c Provided by publisher
▼a Computer networks
▼x Security measures
▼a Game theory
▼a Machine learning
▼a Kamhoua, Charles A.,
▼e editor
▼a Kiekintveld, Christopher D.,
▼e editor
▼a Fang, Fei,
▼d 1989-,
▼e editor
▼a Zhu, Quanyan,
▼e editor
▼b $145.95
▼a 단행본
| 자료유형 : | 단행본 |
|---|---|
| ISBN : | 9781119723929 |
| ISBN : | |
| 분류기호 : | TK5105.59 |
| 서명/저자사항 : | Game theory and machine learning for cyber security / Charles A Kamhoua , Christopher D Kiekintveld, Fei Fang, Quanyan Zhu |
| 발행사항 : | Hoboken, New Jersey : John Wiley & Sons, Inc., [2021] |
| 형태사항 : | pages cm |
| 서지주기 : | Includes bibliographical references and index |
| 내용주기 : | Introduction to game theory / Fei Fang, Shutian Liu, Anjon Basak, Quanyan Zhu, Christopher Kiekintveld, Charles A. Kamhoua -- Scalable algorithms for identifying stealthy attackers in a game theoretic framework using deception / Anjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld -- Honeypot allocation game over attack graphs for cyber deception / Ahmed H. Anwar, Charles Kamhoua, Nandi Leslie, Christopher Kiekintveld. |
| 요약 : | "Cyber security is a serious concern to our economic prosperity and national security. Despite an increased investment in cyber defense, cyber-attackers are becoming more creative and sophisticated. This exposes the need for a more rigorous approach to cyber security, including methods from artificial intelligence including computational game theory and machine learning. Recent advances in adversarial machine learning are promising to make artificial intelligence (AI) algorithms more robust to deception and intelligent manipulation. However, they are still vulnerable to adversarial inputs, data poisoning, model stealing and evasion attacks. The above challenges and the high risk and consequence of cyber-attacks drive the need to accelerate basic research on cyber security"-- Provided by publisher |
| 일반주제명 : | Computer networks -- Security measures -- |
| 일반주제명 : | Game theory -- |
| 일반주제명 : | Machine learning -- |
| 개인저자 : | Kamhoua, Charles A., editor |
| 개인저자 : | Kiekintveld, Christopher D., editor |
| 개인저자 : | Fang, Fei, 1989-, editor |
| 개인저자 : | Zhu, Quanyan, editor |
| 언어 | 영어 |
서평쓰기