000 | 03820nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-319-10374-7 | ||
003 | DE-He213 | ||
005 | 20200420220220.0 | ||
007 | cr nn 008mamaa | ||
008 | 141018s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319103747 _9978-3-319-10374-7 |
||
024 | 7 |
_a10.1007/978-3-319-10374-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCybersecurity Systems for Human Cognition Augmentation _h[electronic resource] / _cedited by Robinson E. Pino, Alexander Kott, Michael Shevenell. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXVI, 209 p. 113 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Information Security, _x1568-2633 ; _v61 |
|
505 | 0 | _aSituational awareness, sensemaking, and situation understanding in cyber warfare -- Neuromorphic Computing for Cognitive Augmentation in Cyber Defense -- Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance -- Data Mining in Cyber Operations -- Trusted Computation through Biologically Inspired Processes -- Dynamic Logic Machine Learning for Cybersecurity -- Towards Neural Network Based Malware Detection on Android Mobile Devices -- Sustainability Problems and a Novelty in the Concept of Energy -- Memristors as Synapses in Artificial Neural Networks: Biomimicry Beyond Weight Change -- Low Power Neuromorphic Architectures to Enable Pervasive Deployment of Intrusion Detection Systems -- Memristor SPICE Model Simulation and Device Hardware Correlation -- Reconfigurable Memristor Based Computing Logic -- Cyber Security Considerations for Reconfigurable Systems. | |
520 | _aThis book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aNeurosciences. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aComputers. | |
650 | 0 | _aArtificial intelligence. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aArtificial Intelligence (incl. Robotics). |
650 | 2 | 4 | _aNeurosciences. |
650 | 2 | 4 | _aInformation Systems and Communication Service. |
650 | 2 | 4 | _aComputer Communication Networks. |
700 | 1 |
_aPino, Robinson E. _eeditor. |
|
700 | 1 |
_aKott, Alexander. _eeditor. |
|
700 | 1 |
_aShevenell, Michael. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319103730 |
830 | 0 |
_aAdvances in Information Security, _x1568-2633 ; _v61 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-10374-7 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c51846 _d51846 |