|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1164359108 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
200710s2020 dk ob 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d EBLCP
|d N$T
|d YDXIT
|d OCLCF
|d ESU
|d OCLCQ
|d OCLCO
|d K6U
|d OCLCQ
|d YDX
|d OCLCQ
|d TYFRS
|d SFB
|d TYFRS
|d UKAHL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1163449555
|a 1163950767
|
020 |
|
|
|a 9788770221870
|q (electronic book)
|
020 |
|
|
|a 8770221871
|q (electronic book)
|
020 |
|
|
|a 9781003337874
|q (electronic bk.)
|
020 |
|
|
|a 1003337872
|q (electronic bk.)
|
020 |
|
|
|a 9781000797213
|q (electronic bk. : EPUB)
|
020 |
|
|
|a 100079721X
|q (electronic bk. : EPUB)
|
020 |
|
|
|a 9781000794052
|q (electronic bk. : PDF)
|
020 |
|
|
|a 1000794059
|q (electronic bk. : PDF)
|
020 |
|
|
|z 877022188X
|
020 |
|
|
|z 9788770221887
|
024 |
7 |
|
|a 10.1201/9781003337874
|2 doi
|
029 |
1 |
|
|a AU@
|b 000070078293
|
035 |
|
|
|a (OCoLC)1164359108
|z (OCoLC)1163449555
|z (OCoLC)1163950767
|
037 |
|
|
|a 9781003337874
|b Taylor & Francis
|
050 |
|
4 |
|a QA76.9.A25
|b P48 2020
|
072 |
|
7 |
|a SCI
|x 024000
|2 bisacsh
|
072 |
|
7 |
|a TEC
|x 008000
|2 bisacsh
|
072 |
|
7 |
|a UY
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Petrenko, Sergei,
|e author.
|
245 |
1 |
0 |
|a Developing a cybersecurity immune system for industry 4.0 /
|c Sergei Petrenko.
|
264 |
|
1 |
|a Gistrup, Denmark :
|b RIVER Publishers,
|c [2020]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a River Publishers Series in Security and Digital Forensics
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks.
|
588 |
0 |
|
|a Online resource; title from digital title page (viewed on October 28, 2020).
|
505 |
0 |
|
|a Foreword vii Preface xiii Acknowledgments xv -- List of Figures xvii -- List of Tables xxvii -- List of Abbreviations xxix Glossary xxxvii Introduction 1 -- 1 Cyber Immunity Concept of the Industry 4.0 -- 5 1.1 Cybersecurity Threat Landscape 6 -- 1.2 Geography of the Cyber-Attacks 19 -- 1.3 Biological Metaphor for Cyber Immunity of Industry 4.0 -- 23 -- 1.4 Prerequisites for the Creation of Cyber Immunity of Industry 4.0 -- 28 -- 1.5 An Even Older Immune Defense Organization 38 -- 1.6 Place of the Immune System of Protection 45 -- 1.7 Development of the Concept of Cyber Immunity of Industry 4.0 -- 50 -- 2 Mathematical Framework for Immune Protection of Industry 4.0 -- 67 -- 2.1 Known Mathematical Basis of Immune Protection 68 -- 2.2 Known Immune Response Models 77 -- 2.3 First Immune Response Software Systems 86 -- 2.4 Problem of the "Digital Bombs" Neutralization 96 -- 2.5 Program Faults Detection Method 108 -- 2.6 Introducing a Passport System for Programs 118 -- 2.7 "Digital Bombs" Neutralization Method 133 -- 2.8 Basic Definitions of Cyber Resilience 148 -- 2.9 Mathematical Formulation of the Cyber Resilience Control Problem 162 -- 3 Trends and Prospects of the Development of Immune Protection of Industry 4.0 -- 177 -- 3.1 Artificial Immune Networks 178 -- 3.2 Immunocomputing 190 -- 3.3 Hybrid Intelligent Protection System 200 -- 3.4 Detection of Anomalies Based on Dimensions 208 -- 3.5 Innovative Methods for Detecting Anomalies 220 -- 3.6 Data Processing Model on the Example of Oracle Solution 235 -- 3.7 Control of the Platform Semantic Correctness 250 -- 4 From the Detection of Cyber-Attacks to Self-Healing Industry 4.0 -- 265 -- 4.1 Classification of Methods for Detecting Cyber-Attacks and Anomalies 266 -- 4.2 Evaluation of the Known Methods for Detecting Cyber-Attacks and Anomalies 275 -- 4.3 Innovative Immune Response Method 287 -- 4.4 Immune Response Method Implementation 300 -- 4.5 Development of Immune Response Method 314 -- 4.6 Intellectual Cyber Resilience Orchestration 323.
|
505 |
8 |
|
|a 4.7 The Semantic Correctness Control 338 -- 4.8 Organization of Self-Healing Computing 345 -- 4.9 New Scientific and Practical Results 366 Conclusion 377 -- References 379 -- Index 405 -- About the Author 409.
|
545 |
0 |
|
|a Sergei Petrenko
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a SCIENCE / Energy
|2 bisacsh
|
650 |
|
7 |
|a TECHNOLOGY / Electronics / General
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 877022188X
|z 9788770221887
|w (OCoLC)1149308515
|
830 |
|
0 |
|a River Publishers series in security and digital forensics.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2463369
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH40652068
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2463369
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 18105810
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16833039
|
994 |
|
|
|a 92
|b IZTAP
|