๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach

โœ Scribed by Simon Parkinson, Andrew Crampton, Richard Hill


Publisher
Springer International Publishing
Year
2018
Tongue
English
Leaves
381
Series
Computer Communications and Networks
Edition
1st ed.
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms.

Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process.

In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.

โœฆ Table of Contents


Front Matter ....Pages i-x
Front Matter ....Pages 1-1
Review into State of the Art of Vulnerability Assessment using Artificial Intelligence (Saad Khan, Simon Parkinson)....Pages 3-32
A Survey of Machine Learning Algorithms and Their Application in Information Security (Mark Stamp)....Pages 33-55
Front Matter ....Pages 57-57
Vulnerability Assessment of Cyber Security for SCADA Systems (Kyle Coffey, Leandros A. Maglaras, Richard Smith, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab et al.)....Pages 59-80
A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection (Alexandros Chrysikos, Stephen McGuire)....Pages 81-99
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection (Igor Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko)....Pages 101-130
Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications (Steven Walker-Roberts, Mohammad Hammoudeh)....Pages 131-155
Front Matter ....Pages 157-157
Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study (Saad Khan, Simon Parkinson)....Pages 159-182
Defending Against Chained Cyber-Attacks by Adversarial Agents (Vivin Paliath, Paulo Shakarian)....Pages 183-209
Vulnerability Detection and Analysis in Adversarial Deep Learning (Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Renato Levy)....Pages 211-234
SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis (Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz)....Pages 235-258
Function Call Graphs Versus Machine Learning for Malware Detection (Deebiga Rajeswaran, Fabio Di Troia, Thomas H. Austin, Mark Stamp)....Pages 259-279
Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models (Dhiviya Dhanasekar, Fabio Di Troia, Katerina Potika, Mark Stamp)....Pages 281-299
Masquerade Detection on Mobile Devices (Swathi Nambiar Kadala Manikoth, Fabio Di Troia, Mark Stamp)....Pages 301-315
Identifying File Interaction Patterns in Ransomware Behaviour (Liam Grant, Simon Parkinson)....Pages 317-335
Front Matter ....Pages 337-337
A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN (Bo Zhou, Curtis Maines, Stephen Tang, Qi Shi)....Pages 339-366
Big Data and Cyber Security: A Visual Analytics Perspective (Suvodeep Mazumdar, Jing Wang)....Pages 367-381
Back Matter ....Pages 383-384

โœฆ Subjects


Computer Science; Computer Communication Networks; Systems and Data Security; Performance and Reliability; Information Systems and Communication Service; Cognitive Psychology


๐Ÿ“œ SIMILAR VOLUMES


Artificial Intelligence and Deep Learnin
โœ Sangita Roy, Rajat Subhra Chakraborty, Jimson Mathew ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› CRC Press ๐ŸŒ English

Artificial Intelligence and Deep Learning for Computer Network: Management and Analysis aims to systematically collect quality research spanning AI, ML, and Deep Learning (DL) applications to diverse sub-topics of computer networks, communications, and security, under a single cover. It also aspires

Artificial Intelligence and Tutoring Sys
โœ Wenger, Etienne ๐Ÿ“‚ Library ๐Ÿ“… 2015 ๐Ÿ› Elsevier Science ๐ŸŒ English

Artificial Intelligence and Tutoring Systems: Computational and Cognitive Approaches to the Communication of Knowledge focuses on the cognitive approaches, methodologies, principles, and concepts involved in the communication of knowledge. The publication first elaborates on knowledge communication

System Analysis and Artificial Intellige
โœ Michael Zgurovsky (editor), Nataliya Pankratova (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Springer ๐ŸŒ English

<p><span>This book contains the latest scientific work of Ukrainian scientists and their colleagues from other countries of the world in three interrelated areas: systems analysis, artificial intelligence and data mining. The included articles present the theoretical foundations and practical applic

Hybrid Intelligent Systems for Pattern R
โœ Patricia Melin, Oscar Castillo ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer ๐ŸŒ English

This monograph describes new methods for intelligent pattern recognition using soft computing techniques including neural networks, fuzzy logic, and genetic algorithms. Hybrid intelligent systems that combine several soft computing techniques are needed due to the complexity of pattern recognition p