000 | 03738cam a2200613 i 4500 | ||
---|---|---|---|
001 | on1268121474 | ||
003 | OCoLC | ||
005 | 20220711203721.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 210702s2021 njua ob 001 0 eng | ||
010 | _a 2021031985 | ||
040 |
_aDLC _beng _erda _cDLC _dIEEEE _dOCLCO _dYDX _dOCLCF _dN$T |
||
020 |
_a1119723949 _qelectronic book |
||
020 |
_a9781119723912 _qelectronic book |
||
020 |
_a1119723914 _qelectronic book |
||
020 |
_a9781119723950 _qelectronic book |
||
020 |
_a1119723957 _qelectronic book |
||
020 |
_a9781119723943 _q(electronic bk.) |
||
020 |
_z9781119723929 _qhardcover |
||
024 | 7 |
_a10.1002/9781119723950 _2doi |
|
035 | _a(OCoLC)1268121474 | ||
037 |
_a9536219 _bIEEE |
||
042 | _apcc | ||
050 | 0 | 4 |
_aTK5105.59 _b.G353 2021 |
082 | 0 | 0 |
_a658.4/78 _223 |
049 | _aMAIN | ||
245 | 0 | 0 |
_aGame theory and machine learning for cyber security / _cedited by Charles A. Kamhoua, Christopher D. Kiekintveld, Fei Fang, Quanyan Zhu. |
264 | 1 |
_aHoboken, New Jersey : _bJohn Wiley & Sons, Inc., _c[2021] |
|
300 |
_a1 online resource : _billustrations (chiefly color) |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 2 | _aIntroduction to game theory / Fei Fang, Shutian Liu, Anjon Basak, Quanyan Zhu, Christopher Kiekintveld, Charles A. Kamhoua -- Scalable algorithms for identifying stealthy attackers in a game theoretic framework using deception / Anjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld -- Honeypot allocation game over attack graphs for cyber deception / Ahmed H. Anwar, Charles Kamhoua, Nandi Leslie, Christopher Kiekintveld. | |
520 |
_a"Cyber security is a serious concern to our economic prosperity and national security. Despite an increased investment in cyber defense, cyber-attackers are becoming more creative and sophisticated. This exposes the need for a more rigorous approach to cyber security, including methods from artificial intelligence including computational game theory and machine learning. Recent advances in adversarial machine learning are promising to make artificial intelligence (AI) algorithms more robust to deception and intelligent manipulation. However, they are still vulnerable to adversarial inputs, data poisoning, model stealing and evasion attacks. The above challenges and the high risk and consequence of cyber-attacks drive the need to accelerate basic research on cyber security"-- _cProvided by publisher. |
||
588 | _aDescription based on online resource; title from digital title page (viewed on September 29, 2021). | ||
590 | _bWiley Frontlist Obook All English 2021 | ||
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aGame theory. _96996 |
|
650 | 0 |
_aMachine learning. _91831 |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 _93969 |
|
650 | 7 |
_aGame theory. _2fast _0(OCoLC)fst00937501 _96996 |
|
650 | 7 |
_aMachine learning. _2fast _0(OCoLC)fst01004795 _91831 |
|
655 | 4 |
_aElectronic books. _93294 |
|
700 | 1 |
_aKamhoua, Charles A., _eeditor. _99097 |
|
700 | 1 |
_aKiekintveld, Christopher D., _eeditor. _910237 |
|
700 | 1 |
_aFang, Fei, _d1989- _eeditor. _910238 |
|
700 | 1 |
_aZhu, Quanyan, _eeditor. _910239 |
|
776 | 0 | 8 |
_iPrint version: _tGame theory and machine learning for cyber security _bFirst edition. _dHoboken, New Jersey : John Wiley & Sons, Inc., [2021] _z9781119723929 _w(DLC) 2021031984 |
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119723950 _zWiley Online Library |
942 | _cEBK | ||
994 |
_a92 _bDG1 |
||
999 |
_c69644 _d69644 |