HOME > Detail View

Detail View

Nature-inspired cyber security and resiliency : fundamentals, techniques and applications

Nature-inspired cyber security and resiliency : fundamentals, techniques and applications

Material type
단행본
Personal Author
El-Alfy, El-Sayed M.
Title Statement
Nature-inspired cyber security and resiliency : fundamentals, techniques and applications / edited by El-Sayed M. El-Alfy ... [et al.].
Publication, Distribution, etc
London :   The Institution of Engineering and Technology,   c2019.  
Physical Medium
xxiv, 454 p. : ill. ; 25 cm.
Series Statement
IET security series ;10
ISBN
9781785616389 9781785616396 (PDF)
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Biomimetics. Computer security. biomimetics. fault tolerant computing. security of data. trusted computing.
000 00000nam u2200205 a 4500
001 000046008782
005 20191212131908
008 191210s2019 enka b 001 0 eng d
020 ▼a 9781785616389
020 ▼a 9781785616396 (PDF)
040 ▼a 211009 ▼c 211009 ▼d 211009
082 0 4 ▼a 006.38 ▼2 23
084 ▼a 006.38 ▼2 DDCK
090 ▼a 006.38 ▼b N285
245 0 0 ▼a Nature-inspired cyber security and resiliency : ▼b fundamentals, techniques and applications / ▼c edited by El-Sayed M. El-Alfy ... [et al.].
260 ▼a London : ▼b The Institution of Engineering and Technology, ▼c c2019.
300 ▼a xxiv, 454 p. : ▼b ill. ; ▼c 25 cm.
490 1 ▼a IET security series ; ▼v 10
504 ▼a Includes bibliographical references and index.
650 0 ▼a Biomimetics.
650 0 ▼a Computer security.
650 0 ▼a biomimetics.
650 0 ▼a fault tolerant computing.
650 0 ▼a security of data.
650 0 ▼a trusted computing.
700 1 ▼a El-Alfy, El-Sayed M.
830 0 ▼a IET security series ; ▼v 10.
945 ▼a KLPA

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 006.38 N285 Accession No. 121251421 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Chapter 1: Nature-inspired analogies and metaphors for cyber security
Chapter 2: When to turn to nature-inspired solutions for cyber systems
Chapter 3: Bioinspired collaboration and cyber security
Chapter 4: Immune-based defence and resiliency
Chapter 5: Bio-inspired approaches for security and resiliency of network traffic
Chapter 6: Security and resilience for network traffic through nature-inspired approaches
Chapter 7: Towards nature-inspired machine-learning approach for cyber security
Chapter 8: Artificial intelligence and data analytics for encrypted traffic classification on anonymity networks
Chapter 9: Bio/nature-inspired algorithms in A.I. for malicious activity detection
Chapter 10: DNA-inspired characterization and detection of novel social Twitter spambots
Chapter 11: Nature-inspired approaches for social network security
Chapter 12: Software diversity for cyber resilience: percolation theoretic approach
Chapter 13: Hunting bugs with nature-inspired fuzzing
Chapter 14: Bio-inspired cyber-security for the smart grid
Chapter 15: Nature-inspired cryptography and cryptanalysis
Chapter 16: Generation of access-control schemes in computer networks based on genetic algorithms

New Arrivals Books in Related Fields

Cartwright, Hugh M. (2021)
한국소프트웨어기술인협회. 빅데이터전략연구소 (2021)