Game theory and machine learning for cyber security / (Record no. 69644)

000 -LEADER
fixed length control field 03738cam a2200613 i 4500
001 - CONTROL NUMBER
control field on1268121474
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711203721.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210702s2021 njua ob 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119723949
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119723912
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119723914
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119723950
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119723957
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119723943
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- hardcover
037 ## -
-- 9536219
-- IEEE
082 00 - CLASSIFICATION NUMBER
Call Number 658.4/78
245 00 - TITLE STATEMENT
Title Game theory and machine learning for cyber security /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource :
505 2# - FORMATTED CONTENTS NOTE
Remark 2 Introduction to game theory / Fei Fang, Shutian Liu, Anjon Basak, Quanyan Zhu, Christopher Kiekintveld, Charles A. Kamhoua -- Scalable algorithms for identifying stealthy attackers in a game theoretic framework using deception / Anjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld -- Honeypot allocation game over attack graphs for cyber deception / Ahmed H. Anwar, Charles Kamhoua, Nandi Leslie, Christopher Kiekintveld.
520 ## - SUMMARY, ETC.
Summary, etc "Cyber security is a serious concern to our economic prosperity and national security. Despite an increased investment in cyber defense, cyber-attackers are becoming more creative and sophisticated. This exposes the need for a more rigorous approach to cyber security, including methods from artificial intelligence including computational game theory and machine learning. Recent advances in adversarial machine learning are promising to make artificial intelligence (AI) algorithms more robust to deception and intelligent manipulation. However, they are still vulnerable to adversarial inputs, data poisoning, model stealing and evasion attacks. The above challenges and the high risk and consequence of cyber-attacks drive the need to accelerate basic research on cyber security"--
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Kamhoua, Charles A.,
700 1# - AUTHOR 2
Author 2 Kiekintveld, Christopher D.,
700 1# - AUTHOR 2
Author 2 Fang, Fei,
700 1# - AUTHOR 2
Author 2 Zhu, Quanyan,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1002/9781119723950
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Hoboken, New Jersey :
-- John Wiley & Sons, Inc.,
-- [2021]
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
520 ## - SUMMARY, ETC.
-- Provided by publisher.
588 ## -
-- Description based on online resource; title from digital title page (viewed on September 29, 2021).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Game theory.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Machine learning.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
-- (OCoLC)fst00872341
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Game theory.
-- (OCoLC)fst00937501
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Machine learning.
-- (OCoLC)fst01004795
994 ## -
-- 92
-- DG1

No items available.