menu
{ "item_title" : "Guide to Vulnerability Analysis for Computer Networks and Systems", "item_author" : [" Simon Parkinson", "Andrew Crampton", "Richard Hill "], "item_description" : "Part I: Introduction and State of the ArtReview of the State of the Art of Vulnerability Assessment Using Artificial IntelligenceSaad Khan and Simon ParkinsonA Survey of Machine Learning Algorithms and Their Application in Information SecurityMark StampPart II: Vulnerability Assessment FrameworksVulnerability Assessment of Cybersecurity for SCADA SystemsKyle Coffey, Leandros A. Maglaras, Richard Smith, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Stylianos Rallis, and Awais YousafA Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern DetectionAlexandros Chrysikos and Stephen McGuireAI and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure SelectionIgor Kotenko, Elena Doynikova, Andrey Chechulin, and Andrey FedorchenkoArtificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing ApplicationsSteven Walker-Roberts and Mohammad HammoudehPart III: Applications of Artificial IntelligenceAutomated Planning of Administrative Tasks Using Historic Events: a File System Case StudySaad Khan and Simon ParkinsonDefending Against Chained Cyber-Attacks by Adversarial AgentsVivin Paliath and Paulo ShakarianVulnerability Detection and Analysis in Adversarial Deep LearningYi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, and Renato LevySOCIO-LENS: Spotting Unsolicited Callers Through Network AnalysisMuhammad Ajmal Azad, Junaid Arshad, and Farhan RiazFunction Call Graphs Versus Machine Learning for Malware DetectionDeebiga Rajeswaran, Fabio Di Troia, Thomas H. Austin, and Mark StampDetecting Encrypted and Polymorphic Malware Using Hidden Markov ModelsDhiviya Dhanasekar, Fabio Di Troia, Katerina Potika, and Mark StampMasquerade Detection on Mobile DevicesSwathi Nambiar Kadala Manikoth, Fabio Di Troia, and Mark StampIdentifying File Interaction Patterns in Ransomware BehaviourLiam Grant and Simon ParkinsonPart IV: VisualisationA Framework for the Visualisation of Cyber Security Requirements and its Application in BPMNBo Zhou, Curtis Maines, Stephen Tang, and Qi ShiBig Data and Cyber Security: A Visual Analytics PerspectiveSuvodeep Mazumdar and Jing Wang", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/3/03/006/474/3030064743_b.jpg", "price_data" : { "retail_price" : "59.99", "online_price" : "59.99", "our_price" : "59.99", "club_price" : "59.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Guide to Vulnerability Analysis for Computer Networks and Systems|Simon Parkinson

Guide to Vulnerability Analysis for Computer Networks and Systems : An Artificial Intelligence Approach

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Part I: Introduction and State of the Art

Review of the State of the Art of Vulnerability Assessment Using Artificial Intelligence
Saad Khan and Simon Parkinson

A Survey of Machine Learning Algorithms and Their Application in Information Security
Mark Stamp

Part II: Vulnerability Assessment Frameworks

Vulnerability Assessment of Cybersecurity for SCADA Systems
Kyle Coffey, Leandros A. Maglaras, Richard Smith, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Stylianos Rallis, and Awais Yousaf

A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection
Alexandros Chrysikos and Stephen McGuire

AI and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection
Igor Kotenko, Elena Doynikova, Andrey Chechulin, and Andrey Fedorchenko

Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications
Steven Walker-Roberts and Mohammad Hammoudeh

Part III: Applications of Artificial Intelligence

Automated Planning of Administrative Tasks Using Historic Events: a File System Case Study
Saad Khan and Simon Parkinson

Defending Against Chained Cyber-Attacks by Adversarial Agents
Vivin Paliath and Paulo Shakarian

Vulnerability Detection and Analysis in Adversarial Deep Learning
Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, and Renato Levy

SOCIO-LENS: Spotting Unsolicited Callers Through Network Analysis
Muhammad Ajmal Azad, Junaid Arshad, and Farhan Riaz

Function Call Graphs Versus Machine Learning for Malware Detection
Deebiga Rajeswaran, Fabio Di Troia, Thomas H. Austin, and Mark Stamp

Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models
Dhiviya Dhanasekar, Fabio Di Troia, Katerina Potika, and Mark Stamp

Masquerade Detection on Mobile Devices
Swathi Nambiar Kadala Manikoth, Fabio Di Troia, and Mark Stamp

Identifying File Interaction Patterns in Ransomware Behaviour
Liam Grant and Simon Parkinson

Part IV: Visualisation

A Framework for the Visualisation of Cyber Security Requirements and its Application in BPMN
Bo Zhou, Curtis Maines, Stephen Tang, and Qi Shi

Big Data and Cyber Security: A Visual Analytics Perspective
Suvodeep Mazumdar and Jing Wang

This item is Non-Returnable

Details

  • ISBN-13: 9783030064747
  • ISBN-10: 3030064743
  • Publisher: Springer
  • Publish Date: January 2019
  • Dimensions: 9.21 x 6.14 x 0.81 inches
  • Shipping Weight: 1.22 pounds
  • Page Count: 384

Related Categories

You May Also Like...

    1

BAM Customer Reviews