Malware and Machine Learning -- Soft Computing Based Epidemical Crisis Prediction -- An ACP-Based Approach to Intelligence and Security Informatics -- Microfiles as a Potential Source of Confidential Information Leakage -- Decision Support in Open Source Intelligence -- Information Fusion Process De
Intelligent Methods for Cyber Warfare
โ Scribed by Ronald R. Yager, Marek Z. Reformat;Naif Alajlan
- Publisher
- Springer International Publishing
- Year
- 2016
- Tongue
- English
- Series
- Studies in computational intelligence 563
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Malware and Machine Learning.- Soft Computing Based Epidemical Crisis Prediction.- An ACP-Based Approach to Intelligence and Security Informatics.- Microfiles as a Potential Source of Confidential Information Leakage.- Decision Support in Open Source Intelligence.- Information Fusion Process Design Issues for Hard and Soft Information: Developing an Initial Prototype.- Intrusion Detection with Type-2 Fuzzy Ontologies and Similarity Measures.- A multi-objective genetic algorithm based approach for effective intrusion detection using neural networks.- Cyber Insider Mission Detection for Situation Awareness.- A Game Theoretic Engine for Cyber Warfare.- Mission Impact Assessment for Cyber Warfare.- Uncertainty modeling: the Computational Economists' View on Cyberwarfare.
โฆ Subjects
Computational intelligence;Computer security;Cyberspace--Security measures;Cyberspace -- Security measures
๐ SIMILAR VOLUMES
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cybe
This book provides an up-to-date, accessible guide to the growing threats in cyberspace that affects everyone from private individuals to businesses to national governments.;Cover; Title Page; Copyright Page; Dedication Page; Table of Contents; Acknowledgments; Chapter 1: The Transformation of Cyber