|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
KNOVEL_on1099985733 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
190504t20192019enk ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d STF
|d OCLCO
|d UKAHL
|d CDN
|d OCLCF
|d UIU
|d N$T
|d YDX
|d KNOVL
|d VRC
|d CUS
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1300706720
|
020 |
|
|
|a 1785616390
|
020 |
|
|
|a 9781785616396
|q (electronic bk.)
|
020 |
|
|
|a 9781523124374
|q (electronic bk.)
|
020 |
|
|
|a 1523124377
|q (electronic bk.)
|
020 |
|
|
|z 9781785616389
|q (hbk.)
|
020 |
|
|
|z 1785616382
|q (hbk.)
|
029 |
1 |
|
|a AU@
|b 000065477143
|
029 |
1 |
|
|a AU@
|b 000065930112
|
035 |
|
|
|a (OCoLC)1099985733
|z (OCoLC)1300706720
|
050 |
|
4 |
|a QP517.B56
|b N38 2019
|
082 |
0 |
4 |
|a 006.38
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Nature-inspired cyber security and resiliency :
|b fundamentals, techniques and applications /
|c edited by El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk.
|
264 |
|
1 |
|a Stevenage :
|b Institution of Engineering & Technology,
|c 2019.
|
264 |
|
4 |
|c ©2019
|
300 |
|
|
|a 1 online resource (xx, 454 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a IET security series ;
|v 10
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Intro; Contents; Preface; About the editors; 1. Nature-inspired analogies and metaphors for cyber security / Elzbieta Rzeszutko and Wojciech Mazurczyk; 1.1 Historical examples of the nature-inspired inventions; 1.2 Classification of the nature-inspired inventions; 1.3 Nature-inspired analogies and metaphors for cyber security: needed or not?; 1.3.1 Adaptability as a key factor in nature; 1.4 Cyber security ecology; 1.4.1 Cyber ecosystem; 1.4.2 Cyber-ecology and its subtypes; 1.4.3 Cyber ecosystem interactions; 1.5 Early nature-inspired terminology in cyber security
|
505 |
8 |
|
|a 1.6 Recent nature-inspired analogies and metaphors for cyber security1.6.1 Nature-inspired cyber security inspired by an organism's characteristic feature/defence mechanism; 1.6.2 Nature-inspired cyber security inspired by organisms' interactions; 1.6.3 Generalised attack scenario analogy; 1.7 Conclusion and outlook; References; 2. When to turn to nature-inspired solutions for cyber systems / Nina H. Fefferman; 2.1 Why natural systems are tempting; 2.1.1 Analogous qualities in engineered cyber systems; 2.2 How biological systems develop solutions; 2.2.1 Darwinian evolution
|
505 |
8 |
|
|a 2.2.2 Avoiding a common trap: best may not be good2.2.3 Does this make natural systems poor sources of inspiration?; 2.3 Evidence of success from nature-inspired efforts; 2.3.1 A standard pattern in nature-inspired design research; 2.4 A few of nature's tools; 2.4.1 Proximate cues; 2.4.2 Distributed decisions; 2.4.3 Error convergence; 2.5 Synergy among nature's tools; 2.6 Potential pitfalls in nature-inspired algorithms specific to cyber security and resilience; 2.6.1 Coevolutionary arms races; 2.6.2 Designed threats versus evolved threats
|
505 |
8 |
|
|a 2.6.3 Trade-offs between security and privacy may be different for each design component2.7 When NOT to use nature-inspired algorithms; 2.8 Conclusions; Acknowledgments; References; 3. Bioinspired collaboration and cyber security / Youna Jung; 3.1 Collaboration; 3.1.1 Computer-supported cooperative work; 3.1.2 Service-oriented architecture; 3.1.3 Online social networks; 3.1.4 Multi-agent systems; 3.2 Bioinspired cooperation; 3.2.1 Cooperation in swarm intelligence; 3.2.2 Coordination in chemistry; 3.3 Access control for bioinspired cooperation; 3.3.1 Traditional access control models
|
505 |
8 |
|
|a 3.3.2 Access control models for bioinspired collaboration3.4 Conclusions and future work; References; 4. Immune-based defence and resiliency / Pierre Parrend; 4.1 Introduction; 4.2 Definitions; 4.3 Core contributions; 4.3.1 Immunity basics; 4.3.2 Complexity aspects of the immune system; 4.3.3 Immune properties of natural organisms; 4.4 Applications; 4.4.1 Immuno-engineering; 4.4.2 Artificial immune systems; 4.4.3 AIS for intrusion detection; 4.4.4 Immune properties of artificial systems; 4.4.5 Limitations and perspectives of AIS applications; 4.5 Conclusions and perspectives; References
|
505 |
8 |
|
|a 5. Bio-inspired approaches for security and resiliency of network traffic / Christopher S. Oehmen and Elena S. Peterson
|
520 |
|
|
|a This is a timely review of the fundamentals, the latest developments and the diverse applications of nature-inspired algorithms in cyber security and resiliency. Based on concepts from natural processes, phenomena and organisms, it presents novel methodologies to cope with cyber security challenges.
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
590 |
|
|
|a Knovel
|b ACADEMIC - Computer Hardware Engineering
|
650 |
|
0 |
|a Biomimetics.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Biomimetics
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Chimie biomimétique.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Biomimetics.
|2 fast
|0 (OCoLC)fst00832620
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a biomimetics.
|2 inspect
|
650 |
|
7 |
|a fault tolerant computing.
|2 inspect
|
650 |
|
7 |
|a security of data.
|2 inspect
|
650 |
|
7 |
|a trusted computing.
|2 inspect
|
700 |
1 |
|
|a El-Alfy, El Sayed M.,
|d 1968-
|e editor.
|
700 |
1 |
|
|a Eltoweissy, Mohamed,
|e editor.
|
700 |
1 |
|
|a Fulp, Errin W.,
|e editor.
|
700 |
1 |
|
|a Mazurczyk, Wojciech,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|a El-Alfy, El-Sayed M.
|t Nature-Inspired Cyber Security and Resiliency : Fundamentals, Techniques and Applications.
|d Stevenage : Institution of Engineering & Technology, ©2019
|z 9781785616389
|
830 |
|
0 |
|a IET security series ;
|v 10.
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpNICSRFT2/toc
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH34690406
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5760539
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2103539
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 300481668
|
994 |
|
|
|a 92
|b IZTAP
|