Cybersecurity Systems for Human Cognition Augmentation
โ Scribed by Robinson E. Pino, Alexander Kott, Michael Shevenell (eds.)
- Publisher
- Springer International Publishing
- Year
- 2014
- Tongue
- English
- Leaves
- 222
- Series
- Advances in Information Security 61
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.
โฆ Table of Contents
Front Matter....Pages i-xvi
Situational Awareness, Sensemaking, and Situation Understanding in Cyber Warfare....Pages 1-18
Neuromorphic Computing for Cognitive Augmentation in Cyber Defense....Pages 19-45
Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance....Pages 47-60
Data Mining in Cyber Operations....Pages 61-73
Trusted Computation Through Biologically Inspired Processes....Pages 75-84
Dynamic Logic Machine Learning for Cybersecurity....Pages 85-98
Towards Neural Network Based Malware Detection on Android Mobile Devices....Pages 99-117
Sustainability Problems and a Novelty in the Concept of Energy....Pages 119-133
Memristors as Synapses in Artificial Neural Networks: Biomimicry Beyond Weight Change....Pages 135-150
Low Power Neuromorphic Architectures to Enable Pervasive Deployment of Intrusion Detection Systems....Pages 151-168
Memristor SPICE Model Simulation and Device Hardware Correlation....Pages 169-174
Reconfigurable Memristor Based Computing Logic....Pages 175-182
Cyber Security Considerations for Reconfigurable Systems....Pages 183-209
โฆ Subjects
Systems and Data Security; Artificial Intelligence (incl. Robotics); Neurosciences; Information Systems and Communication Service; Computer Communication Networks
๐ SIMILAR VOLUMES
The leading thinkers from the cognitive science tradition participated in a workshop sponsored by Sandia National Laboratories in July of 2003 to discuss progress in building their models. The goal was to summarize the theoretical and empirical bases for cognitive systems and to present exemplary de
SCADA technology quietly operates in the background of critical utility and industrial facilities nationwide. This important tool efficiently manages utility assets, refineries and other critical industrial segments, but protecting SCADA networks from cyber attacks, hackers and even physical assault
SCADA technology quietly operates in the background of critical utility and industrial facilities nationwide. This important tool efficiently manages utility assets, refineries and other critical industrial segments, but protecting SCADA networks from cyber attacks, hackers and even physical assault
<p>The world has changed since the first edition was published in 2006. There have been many technological changes in communications and networking and in other areas of computer science. More focus is given to implementing cybersecurity protections and technical countermeasures. The second edition
This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabili