Cyber warfare : building the scientific foundation / Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, editors.

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, pro...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Other Authors: Jajodia, Sushil (Editor), Shakarian, Paulo (Editor), Subrahmanian, V. S. (Editor), Swarup, Vipin (Editor), Wang, Cliff (Editor)
Format: eBook
Language:English
Published: Cham : Springer, 2015.
Series:Advances in information security ; 56.
Subjects:

MARC

LEADER 00000cam a2200000xi 4500
001 b8041053
003 CoU
006 m o d
007 cr |||||||||||
008 150413s2015 sz a o 000 0 eng d
005 20230817230256.6
019 |a 922976772  |a 927513875  |a 972036961 
020 |a 9783319140391  |q electronic bk 
020 |a 3319140396  |q electronic bk 
020 |z 9783319140384 
020 |a 3319140388 
020 |a 9783319140384 
024 7 |a 10.1007/978-3-319-14039-1 
035 |a (OCoLC)spr907238061 
035 |a (OCoLC)907238061  |z (OCoLC)922976772  |z (OCoLC)927513875  |z (OCoLC)972036961 
035 |a (OCoLC)907238061  |z (OCoLC)922976772  |z (OCoLC)927513875 
037 |a spr10.1007/978-3-319-14039-1 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d GW5XE  |d N$T  |d E7B  |d CDX  |d IDEBK  |d COO  |d UPM  |d EBLCP  |d VLB  |d OCLCF  |d LVT 
049 |a GWRE 
050 4 |a QA76.9.A25  |b C93 2015eb 
245 0 0 |a Cyber warfare :  |b building the scientific foundation /  |c Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, editors. 
264 1 |a Cham :  |b Springer,  |c 2015. 
300 |a 1 online resource (xiii, 321 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a Advances in information security,  |x 1568-2633 ;  |v volume 56. 
504 |a Includes bibliographical references. 
505 0 |a Cyber War Games -- Alternatives to Cyber Warfare: Deterrence and Assurance -- Identifying and Exploiting the Cyber High Ground with Botnets -- Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberfare -- Game-theoretic Foundations for the Strategic Use of Honeypots in Network Security -- Cyber Counterdeception: How to Detect Denial & Deception -- Automated Adversary Profiling -- Cyber Attribution: An Argumentation-Based Approach -- The Human Factor in Cybersecurity: Robust & Intelligent Defense -- CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War -- Active Discovery of Hidden Profiles in Social Networks using Malware -- A Survery of Community Detection Algorithms Based on Analysis-Intent -- Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks -- Graph Mining for Cyber Security -- Programming language theoretic security in the real world: a mirage or the future? 
520 |a This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed April 16, 2015) 
650 0 |a Computer crimes.  |0 http://id.loc.gov/authorities/subjects/sh85029492. 
650 0 |a Cyberspace operations (Military science)  |0 http://id.loc.gov/authorities/subjects/sh2013000988. 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277. 
650 0 |a Computer security.  |0 http://id.loc.gov/authorities/subjects/sh90001862. 
650 7 |a Computer crimes.  |2 fast  |0 (OCoLC)fst00872063. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484. 
650 7 |a Cyberspace operations (Military science)  |2 fast  |0 (OCoLC)fst01909446. 
700 1 |a Jajodia, Sushil,  |e editor.  |0 http://id.loc.gov/authorities/names/nr89003763  |1 http://isni.org/isni/0000000109680821. 
700 1 |a Shakarian, Paulo,  |e editor.  |0 http://id.loc.gov/authorities/names/n2012010995  |1 http://isni.org/isni/0000000365937323. 
700 1 |a Subrahmanian, V. S.,  |e editor.  |0 http://id.loc.gov/authorities/names/n91041505  |1 http://isni.org/isni/0000000115809345. 
700 1 |a Swarup, Vipin,  |e editor.  |0 http://id.loc.gov/authorities/names/no2004092485  |1 http://isni.org/isni/0000000378240816. 
700 1 |a Wang, Cliff,  |e editor.  |0 http://id.loc.gov/authorities/names/n2007005295  |1 http://isni.org/isni/0000000051778403. 
776 0 8 |i Printed edition:  |z 9783319140384. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-14039-1  |z Full Text (via Springer) 
830 0 |a Advances in information security ;  |v 56.  |0 http://id.loc.gov/authorities/names/n00006047. 
907 |a .b80410534  |b 03-19-20  |c 06-22-15 
915 |a I 
998 |a web  |b 05-01-17  |c g  |d b   |e -  |f eng  |g sz   |h 0  |i 1 
907 |a .b80410534  |b 07-02-19  |c 06-22-15 
944 |a MARS - RDA ENRICHED 
907 |a .b80410534  |b 07-06-17  |c 06-22-15 
907 |a .b80410534  |b 05-23-17  |c 06-22-15 
956 |a Springer e-books 
956 |b Springer Computer Science eBooks 2015 English/International 
956 |b Springer English/International eBooks 2015 - Full Set 
999 f f |i bd64c251-cd05-5c85-a1f0-81cf748cf073  |s 58d9eee1-b4f9-598a-a2b0-fcbbcce8f573 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25 C93 2015eb  |h Library of Congress classification  |i Ebooks, Prospector  |n 1