MARC보기
LDR00000cam u2200205Ii 4500
001000000438863
00520200306170151
007cr |n|||||||||
008190504s2019 enk ob 001 0 eng d
020 ▼a 1785616390
020 ▼a 9781785616396 ▼q (electronic bk.)
020 ▼z 9781785616389 ▼q (hbk.)
020 ▼z 1785616382 ▼q (hbk.)
035 ▼a 2103539 ▼b (N$T)
035 ▼a (OCoLC)1099985733
040 ▼a EBLCP ▼b eng ▼c EBLCP ▼d STF ▼d OCLCO ▼d UKAHL ▼d CDN ▼d OCLCF ▼d UIU ▼d N$T ▼d 247004
050 4 ▼a QP517.B56 ▼b N38 2019
08204 ▼a 006.38
24500 ▼a Nature-inspired cyber security and resiliency : ▼b fundamentals, techniques and applications/ ▼c edited by El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk. ▼h [electronic resource].
260 1 ▼a Stevenage: ▼b Institution of Engineering & Technology, ▼c 2019.
300 ▼a 1 online resource (xx, 454 pages).
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a computer ▼b c ▼2 rdamedia
338 ▼a online resource ▼b cr ▼2 rdacarrier
4901 ▼a IET security series; ▼v 10.
504 ▼a Includes bibliographical references and index.
5050 ▼a Intro; Contents; Preface; About the editors; 1. Nature-inspired analogies and metaphors for cyber security / Elzbieta Rzeszutko and Wojciech Mazurczyk; 1.1 Historical examples of the nature-inspired inventions; 1.2 Classification of the nature-inspired inventions; 1.3 Nature-inspired analogies and metaphors for cyber security: needed or not?; 1.3.1 Adaptability as a key factor in nature; 1.4 Cyber security ecology; 1.4.1 Cyber ecosystem; 1.4.2 Cyber-ecology and its subtypes; 1.4.3 Cyber ecosystem interactions; 1.5 Early nature-inspired terminology in cyber security
5058 ▼a 1.6 Recent nature-inspired analogies and metaphors for cyber security1.6.1 Nature-inspired cyber security inspired by an organism's characteristic feature/defence mechanism; 1.6.2 Nature-inspired cyber security inspired by organisms' interactions; 1.6.3 Generalised attack scenario analogy; 1.7 Conclusion and outlook; References; 2. When to turn to nature-inspired solutions for cyber systems / Nina H. Fefferman; 2.1 Why natural systems are tempting; 2.1.1 Analogous qualities in engineered cyber systems; 2.2 How biological systems develop solutions; 2.2.1 Darwinian evolution
5058 ▼a 2.2.2 Avoiding a common trap: best may not be good2.2.3 Does this make natural systems poor sources of inspiration?; 2.3 Evidence of success from nature-inspired efforts; 2.3.1 A standard pattern in nature-inspired design research; 2.4 A few of nature's tools; 2.4.1 Proximate cues; 2.4.2 Distributed decisions; 2.4.3 Error convergence; 2.5 Synergy among nature's tools; 2.6 Potential pitfalls in nature-inspired algorithms specific to cyber security and resilience; 2.6.1 Coevolutionary arms races; 2.6.2 Designed threats versus evolved threats
5058 ▼a 2.6.3 Trade-offs between security and privacy may be different for each design component2.7 When NOT to use nature-inspired algorithms; 2.8 Conclusions; Acknowledgments; References; 3. Bioinspired collaboration and cyber security / Youna Jung; 3.1 Collaboration; 3.1.1 Computer-supported cooperative work; 3.1.2 Service-oriented architecture; 3.1.3 Online social networks; 3.1.4 Multi-agent systems; 3.2 Bioinspired cooperation; 3.2.1 Cooperation in swarm intelligence; 3.2.2 Coordination in chemistry; 3.3 Access control for bioinspired cooperation; 3.3.1 Traditional access control models
5058 ▼a 3.3.2 Access control models for bioinspired collaboration3.4 Conclusions and future work; References; 4. Immune-based defence and resiliency / Pierre Parrend; 4.1 Introduction; 4.2 Definitions; 4.3 Core contributions; 4.3.1 Immunity basics; 4.3.2 Complexity aspects of the immune system; 4.3.3 Immune properties of natural organisms; 4.4 Applications; 4.4.1 Immuno-engineering; 4.4.2 Artificial immune systems; 4.4.3 AIS for intrusion detection; 4.4.4 Immune properties of artificial systems; 4.4.5 Limitations and perspectives of AIS applications; 4.5 Conclusions and perspectives; References
5058 ▼a 5. Bio-inspired approaches for security and resiliency of network traffic / Christopher S. Oehmen and Elena S. Peterson
520 ▼a This is a timely review of the fundamentals, the latest developments and the diverse applications of nature-inspired algorithms in cyber security and resiliency. Based on concepts from natural processes, phenomena and organisms, it presents novel methodologies to cope with cyber security challenges.
5880 ▼a Print version record.
590 ▼a Added to collection customer.56279.3
650 0 ▼a Biomimetics.
650 0 ▼a Computer security.
650 7 ▼a Biomimetics. ▼2 fast ▼0 (OCoLC)fst00832620
650 7 ▼a Computer security. ▼2 fast ▼0 (OCoLC)fst00872484
650 7 ▼a biomimetics. ▼2 inspect
650 7 ▼a fault tolerant computing. ▼2 inspect
650 7 ▼a security of data. ▼2 inspect
650 7 ▼a trusted computing. ▼2 inspect
655 4 ▼a Electronic books.
7001 ▼a El-Alfy, El-Sayed M., ▼e editor,
7001 ▼a Eltoweissy, Mohamed., ▼e editor,
7001 ▼a Fulp, Errin W., ▼e editor,
7001 ▼a Mazurczyk, Wojciech, ▼e editor,
77608 ▼i Print version: ▼a El-Alfy, El-Sayed M. ▼t Nature-Inspired Cyber Security and Resiliency : Fundamentals, Techniques and Applications ▼d Stevenage : Institution of Engineering & Technology,c2019 ▼z 9781785616389
830 0 ▼a IET security series ; ▼v 10.
85640 ▼3 EBSCOhost ▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2103539
938 ▼a Askews and Holts Library Services ▼b ASKH ▼n AH34690406
938 ▼a EBL - Ebook Library ▼b EBLB ▼n EBL5760539
938 ▼a EBSCOhost ▼b EBSC ▼n 2103539
990 ▼a ***1008102
991 ▼a E-BOOK
994 ▼a 92 ▼b N$T