|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Robinson E. PinoPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: 2014 ed. Volume: 55 Dimensions: Width: 15.50cm , Height: 1.60cm , Length: 23.50cm Weight: 4.511kg ISBN: 9781489990655ISBN 10: 1489990658 Pages: 285 Publication Date: 04 July 2015 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsTowards Fundamental Science of Cyber Security.- Bridging the Semantic Gap: Human Factors in Anomaly-based Intrusion Detection Systems.- Recognizing Unexplained Behavior in Network Traffic.- Applying Cognitive Memory to CyberSecurity.- Understanding Cyber Warfare.- Design of Neuromorphic Architectures with Memristors.- Nanoelectronics and Hardware Security.- User Classification and Authentication for MOBILE Device Based on Gesture Recognition.- Hardware-based Computational Intelligence for Size, Weight, and Power Con-strained Environments.- Machine Learning Applied to Cyber Operations.- Detecting Kernel Control-flow Modifying Rootkits.- Formation of Artificial and Natural Intelligence in Big Data Environment.- Alert Data Aggregation and Transmission Prioritization over Mobile Networks.- Semantic Features from Web-traffic Streams.- Concurrent Learning Algorithm (CLA) and the Importance Map (IMAP).- Hardware Accelerated Mining of Domain Knowledge.- Memristors and the Future of Cyber Security Hardware.ReviewsFrom the reviews: The book is meant for students, engineers, technicians, and researchers in fields such as information security and systems engineering. ... The book showcases some of the latest advances in the field of information security. The papers included are very heterogeneous; however, they all come under the common theme of network science and cybersecurity. The book is of high quality and is praiseworthy. (S. V. Nagaraj, Computing Reviews, May, 2014) From the reviews: The book is meant for students, engineers, technicians, and researchers in fields such as information security and systems engineering. ... The book showcases some of the latest advances in the field of information security. The papers included are very heterogeneous; however, they all come under the common theme of network science and cybersecurity. The book is of high quality and is praiseworthy. (S. V. Nagaraj, Computing Reviews, May, 2014) Author InformationTab Content 6Author Website:Countries AvailableAll regions |