logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

일간
|
주간
|
월간

실시간 검색어

검색가능 서점

도서목록 제공

Game Theory and Machine Learning for Cyber Security

Game Theory and Machine Learning for Cyber Security (Hardcover)

Charles A. Kamhoua, Christopher D. Kiekintveld (엮은이)
Wiley-IEEE Press
268,180원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
219,900원 -18% 0원
11,000원
208,900원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Game Theory and Machine Learning for Cyber Security
eBook 미리보기

책 정보

· 제목 : Game Theory and Machine Learning for Cyber Security (Hardcover) 
· 분류 : 외국도서 > 기술공학 > 기술공학 > 텔레커뮤니케이션
· ISBN : 9781119723929
· 쪽수 : 544쪽
· 출판일 : 2021-09-15

목차

Editor biographies

Contributors

Foreword

Preface

 

Chapter 1:           Introduction

Christopher D. Kiekintveld, Charles A. Kamhoua, Fei Fang, Quanyan Zhu

 

Part 1:   Game Theory for Cyber Deception

 

Chapter 2:           Introduction to Game Theory

Fei Fang, Shutian Liu, Anjon Basak, Quanyan Zhu, Christopher Kiekintveld, Charles A. Kamhoua

 

Chapter 3:           Scalable Algorithms for Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception

Anjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld

 

Chapter 4:           Honeypot Allocation Game over Attack Graphs for Cyber Deception

Ahmed H. Anwar, Charles Kamhoua, Nandi Leslie, Christopher Kiekintveld

 

Chapter 5:           Evaluating Adaptive Deception Strategies for Cyber Defense with Human Experimentation

Palvi Aggarwal, Marcus Gutierrez, Christopher Kiekintveld, Branislav Bosansky, Cleotilde Gonzalez

 

Chapter 6:           A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception

Jie Fu, Abhishek N. Kulkarni

 

Part 2:   Game Theory for Cyber Security

 

Chapter 7:           Minimax Detection (MAD) for Computer Security: A Dynamic Program Characterization

Muhammed O. Sayin, Dinuka Sahabandu, Muhammad Aneeq uz Zaman, Radha Poovendran, Tamer Başar

 

Chapter 8:           Sensor Manipulation Games in Cyber Security

João P. Hespanha

 

Chapter 9:           Adversarial Gaussian Process Regression in Sensor Networks

Yi Li, Xenofon Koutsoukos, Yevgeniy Vorobeychik

 

Chapter 10:        Moving Target Defense Games for Cyber Security: Theory and Applications Abdelrahman Eldosouky, Shamik Sengupta

 

Chapter 11:        Continuous Authentication Security Games

Serkan Saritas, Ezzeldin Shereen, Henrik Sandberg, Gyorgy Dan

Chapter 12:        Cyber Autonomy in Software Security: Techniques and Tactics

Tiffany Bao, Yan Shoshitaishvili

 

Part 3:   Adversarial Machine Learning for Cyber Security

 

Chapter 13:        A Game Theoretic Perspective on Adversarial Machine Learning and Related Cybersecurity Applications

Yan Zhou, Murat Kantarcioglu, Bowei Xi

 

Chapter 14:        Adversarial Machine Learning in 5G Communications Security

Yalin Sagduyu, Tugba Erpek, Yi Shi

 

Chapter 15:        Machine Learning in the Hands of a Malicious Adversary: A Near Future If Not Reality Keywhan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T. Kalbarczyk, Thenkurussi Kesavadas, Ravishankar K. Iyer

 

Chapter 16:        Trinity: Trust, Resilience and Interpretability of Machine Learning Models

Susmit Jha, Anirban Roy, Brian Jalaian, Gunjan Verma

 

Part 4:   Generative Models for Cyber Security

 

Chapter 17:        Evading Machine Learning based Network Intrusion Detection Systems with GANs Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Mike Weisman

 

Chapter 18:        Concealment Charm (ConcealGAN): Automatic Generation of Steganographic Text using Generative Models to Bypass Censorship

Nurpeiis Baimukan, Quanyan Zhu

 

Part 5:   Reinforcement Learning for Cyber Security

 

Chapter 19:        Manipulating Reinforcement Learning: Stealthy Attacks on Cost Signals

Yunhan Huang, Quanyan Zhu

 

Chapter 20:        Resource-Aware Intrusion Response based on Deep Reinforcement Learning for Software-Defined Internet-of-Battle-Things

Seunghyun Yoon, Jin-Hee Cho, Gaurav Dixit, Ing-Ray Chen

 

Part 6:   Other Machine Learning approach to Cyber Security

 

Chapter 21:        Smart Internet Probing: Scanning Using Adaptive Machine Learning

Armin Sarabi, Kun Jin, Mingyan Liu

 

Chapter 22:        Semi-automated Parameterization of a Probabilistic Model using Logistic Regression - A Tutorial

Stefan Rass, Sandra König, Stefan Schauer

 

Chapter 23:        Resilient Distributed Adaptive Cyber-Defense using Blockchain

George Cybenko, Roger A. Hallman

 

Chapter 24:        Summary and Future Work

Quanyan Zhu, Fei Fang

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책