000 03738cam a2200613 i 4500
001 on1268121474
003 OCoLC
005 20220711203721.0
006 m o d
007 cr |||||||||||
008 210702s2021 njua ob 001 0 eng
010 _a 2021031985
040 _aDLC
_beng
_erda
_cDLC
_dIEEEE
_dOCLCO
_dYDX
_dOCLCF
_dN$T
020 _a1119723949
_qelectronic book
020 _a9781119723912
_qelectronic book
020 _a1119723914
_qelectronic book
020 _a9781119723950
_qelectronic book
020 _a1119723957
_qelectronic book
020 _a9781119723943
_q(electronic bk.)
020 _z9781119723929
_qhardcover
024 7 _a10.1002/9781119723950
_2doi
035 _a(OCoLC)1268121474
037 _a9536219
_bIEEE
042 _apcc
050 0 4 _aTK5105.59
_b.G353 2021
082 0 0 _a658.4/78
_223
049 _aMAIN
245 0 0 _aGame theory and machine learning for cyber security /
_cedited by Charles A. Kamhoua, Christopher D. Kiekintveld, Fei Fang, Quanyan Zhu.
264 1 _aHoboken, New Jersey :
_bJohn Wiley & Sons, Inc.,
_c[2021]
300 _a1 online resource :
_billustrations (chiefly color)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 2 _aIntroduction to game theory / Fei Fang, Shutian Liu, Anjon Basak, Quanyan Zhu, Christopher Kiekintveld, Charles A. Kamhoua -- Scalable algorithms for identifying stealthy attackers in a game theoretic framework using deception / Anjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld -- Honeypot allocation game over attack graphs for cyber deception / Ahmed H. Anwar, Charles Kamhoua, Nandi Leslie, Christopher Kiekintveld.
520 _a"Cyber security is a serious concern to our economic prosperity and national security. Despite an increased investment in cyber defense, cyber-attackers are becoming more creative and sophisticated. This exposes the need for a more rigorous approach to cyber security, including methods from artificial intelligence including computational game theory and machine learning. Recent advances in adversarial machine learning are promising to make artificial intelligence (AI) algorithms more robust to deception and intelligent manipulation. However, they are still vulnerable to adversarial inputs, data poisoning, model stealing and evasion attacks. The above challenges and the high risk and consequence of cyber-attacks drive the need to accelerate basic research on cyber security"--
_cProvided by publisher.
588 _aDescription based on online resource; title from digital title page (viewed on September 29, 2021).
590 _bWiley Frontlist Obook All English 2021
650 0 _aComputer networks
_xSecurity measures.
_93969
650 0 _aGame theory.
_96996
650 0 _aMachine learning.
_91831
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
_93969
650 7 _aGame theory.
_2fast
_0(OCoLC)fst00937501
_96996
650 7 _aMachine learning.
_2fast
_0(OCoLC)fst01004795
_91831
655 4 _aElectronic books.
_93294
700 1 _aKamhoua, Charles A.,
_eeditor.
_99097
700 1 _aKiekintveld, Christopher D.,
_eeditor.
_910237
700 1 _aFang, Fei,
_d1989-
_eeditor.
_910238
700 1 _aZhu, Quanyan,
_eeditor.
_910239
776 0 8 _iPrint version:
_tGame theory and machine learning for cyber security
_bFirst edition.
_dHoboken, New Jersey : John Wiley & Sons, Inc., [2021]
_z9781119723929
_w(DLC) 2021031984
856 4 0 _uhttps://doi.org/10.1002/9781119723950
_zWiley Online Library
942 _cEBK
994 _a92
_bDG1
999 _c69644
_d69644