검색

상세정보

  • HOME
  • 검색상세정보

Nature-inspired cyber security and resiliency : fundamentals, techniques and applications [electronic resource]

El-Alfy, El-Sayed M.

책이미지
서평쓰기
서평쓰기
책이미지

QRcode

QR Code
QRcode 사용방법
QRcode 사용방법
QR코드 정의
사각형의 가로세로 격자무늬에 다양한 정보를 담고 있는 2차원(매트릭스)형식의 코드로 스마트폰으로 QR코드를 스캔하면 각종 정보를 제공 받을 수 있습니다.
QR코드 인식프로그램
스마트폰 마켓에 들어가면 'QR코드 스캔 프로그램'을 검색해 무료 어플을 다운받아 사용하시면 됩니다.
도서정보 QR코드 이용하기
도서 상세정보에서 QR코드를 스캔하면, 모바일 웹페이지로 연결되어 해당 도서의 상세정보 및 소장정보 등을 확인 할 수 있습니다.
닫기
상세정보
자료유형E-BOOK
서명/저자사항Nature-inspired cyber security and resiliency : fundamentals, techniques and applications/ edited by El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk. [electronic resource].
개인저자El-Alfy, El-Sayed M.,editor,
Eltoweissy, Mohamed.,editor,
Fulp, Errin W.,editor,
Mazurczyk, Wojciech,editor,
발행사항Stevenage: Institution of Engineering & Technology, 2019.
형태사항1 online resource (xx, 454 pages).
총서사항IET security series;10.
기타형태 저록Print version: El-Alfy, El-Sayed M. Nature-Inspired Cyber Security and Resiliency : Fundamentals, Techniques and Applications Stevenage : Institution of Engineering & Technology,c2019 9781785616389
ISBN1785616390
9781785616396


서지주기Includes bibliographical references and index.
내용주기Intro; Contents; Preface; About the editors; 1. Nature-inspired analogies and metaphors for cyber security / Elzbieta Rzeszutko and Wojciech Mazurczyk; 1.1 Historical examples of the nature-inspired inventions; 1.2 Classification of the nature-inspired inventions; 1.3 Nature-inspired analogies and metaphors for cyber security: needed or not?; 1.3.1 Adaptability as a key factor in nature; 1.4 Cyber security ecology; 1.4.1 Cyber ecosystem; 1.4.2 Cyber-ecology and its subtypes; 1.4.3 Cyber ecosystem interactions; 1.5 Early nature-inspired terminology in cyber security
1.6 Recent nature-inspired analogies and metaphors for cyber security1.6.1 Nature-inspired cyber security inspired by an organism's characteristic feature/defence mechanism; 1.6.2 Nature-inspired cyber security inspired by organisms' interactions; 1.6.3 Generalised attack scenario analogy; 1.7 Conclusion and outlook; References; 2. When to turn to nature-inspired solutions for cyber systems / Nina H. Fefferman; 2.1 Why natural systems are tempting; 2.1.1 Analogous qualities in engineered cyber systems; 2.2 How biological systems develop solutions; 2.2.1 Darwinian evolution
2.2.2 Avoiding a common trap: best may not be good2.2.3 Does this make natural systems poor sources of inspiration?; 2.3 Evidence of success from nature-inspired efforts; 2.3.1 A standard pattern in nature-inspired design research; 2.4 A few of nature's tools; 2.4.1 Proximate cues; 2.4.2 Distributed decisions; 2.4.3 Error convergence; 2.5 Synergy among nature's tools; 2.6 Potential pitfalls in nature-inspired algorithms specific to cyber security and resilience; 2.6.1 Coevolutionary arms races; 2.6.2 Designed threats versus evolved threats
2.6.3 Trade-offs between security and privacy may be different for each design component2.7 When NOT to use nature-inspired algorithms; 2.8 Conclusions; Acknowledgments; References; 3. Bioinspired collaboration and cyber security / Youna Jung; 3.1 Collaboration; 3.1.1 Computer-supported cooperative work; 3.1.2 Service-oriented architecture; 3.1.3 Online social networks; 3.1.4 Multi-agent systems; 3.2 Bioinspired cooperation; 3.2.1 Cooperation in swarm intelligence; 3.2.2 Coordination in chemistry; 3.3 Access control for bioinspired cooperation; 3.3.1 Traditional access control models
3.3.2 Access control models for bioinspired collaboration3.4 Conclusions and future work; References; 4. Immune-based defence and resiliency / Pierre Parrend; 4.1 Introduction; 4.2 Definitions; 4.3 Core contributions; 4.3.1 Immunity basics; 4.3.2 Complexity aspects of the immune system; 4.3.3 Immune properties of natural organisms; 4.4 Applications; 4.4.1 Immuno-engineering; 4.4.2 Artificial immune systems; 4.4.3 AIS for intrusion detection; 4.4.4 Immune properties of artificial systems; 4.4.5 Limitations and perspectives of AIS applications; 4.5 Conclusions and perspectives; References
5. Bio-inspired approaches for security and resiliency of network traffic / Christopher S. Oehmen and Elena S. Peterson
요약This is a timely review of the fundamentals, the latest developments and the diverse applications of nature-inspired algorithms in cyber security and resiliency. Based on concepts from natural processes, phenomena and organisms, it presents novel methodologies to cope with cyber security challenges.
일반주제명Biomimetics.
Computer security.
Biomimetics.
Computer security.
biomimetics.
fault tolerant computing.
security of data.
trusted computing.
언어영어
바로가기 URL

소장정보

서비스 이용안내
  • 서가에없는책서가에없는책
  • 도서배달서비스도서배달서비스
  • 인쇄인쇄
메세지가 없습니다
No. 등록번호 청구기호 소장처 도서상태 반납예정일 예약 서비스 매체정보
1 EB72841 URL 참조006.38 중앙도서관 대출가능
서가에없는책 도서배달서비스 인쇄 이미지
2 EB72838 URL 참조006.38 중앙도서관 대출가능
서가에없는책 도서배달서비스 인쇄 이미지
3 EB72839 URL 참조006.38 중앙도서관 대출가능
서가에없는책 도서배달서비스 인쇄 이미지
4 EB72840 URL 참조006.38 중앙도서관 대출가능
서가에없는책 도서배달서비스 인쇄 이미지

청구기호 Browsing

이 분야 인기자료

  • 표지이미지
    지적인 어른을 위한 최소한의 교양수업 : 평생의 무기가...
    사이토 다카시
    더퀘스트: 길벗, 2024
  • 표지이미지
    비밀의 도서관 : 호메로스에서 케인스까지 99권으로 읽...
    티얼, 올리버
    생각정거장, 2017
  • 표지이미지
    도서관경영론
    정동열
    한국도서관협회, 2023
  • 표지이미지
    가짜뉴스의 사회학 = the sociology of f...
    박창호
    서울경제경영, 2024
  • 표지이미지
    도서관과 리터러시 파워
    송경진
    정은문고, 2023

서평 (0 건)

*주제와 무관한 내용의 서평은 삭제될 수 있습니다.

서평추가

서평추가
별점
별0점
  • 별5점
  • 별4.5점
  • 별4점
  • 별3.5점
  • 별3점
  • 별2.5점
  • 별2점
  • 별1.5점
  • 별1점
  • 별0.5점
  • 별0점
*서평 입력 시 선택한 별점은 전체 별점에 반영됩니다.
제목입력
본문입력

태그

태그추가

태그추가
태그입력
태그보기