Cargando…

Nature-inspired cyber security and resiliency : fundamentals, techniques and applications /

This is a timely review of the fundamentals, the latest developments and the diverse applications of nature-inspired algorithms in cyber security and resiliency. Based on concepts from natural processes, phenomena and organisms, it presents novel methodologies to cope with cyber security challenges.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: El-Alfy, El Sayed M., 1968- (Editor ), Eltoweissy, Mohamed (Editor ), Fulp, Errin W. (Editor ), Mazurczyk, Wojciech (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Stevenage : Institution of Engineering & Technology, 2019.
Colección:IET security series ; 10.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 KNOVEL_on1099985733
003 OCoLC
005 20231027140348.0
006 m o d
007 cr |n|||||||||
008 190504t20192019enk ob 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d STF  |d OCLCO  |d UKAHL  |d CDN  |d OCLCF  |d UIU  |d N$T  |d YDX  |d KNOVL  |d VRC  |d CUS  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 1300706720 
020 |a 1785616390 
020 |a 9781785616396  |q (electronic bk.) 
020 |a 9781523124374  |q (electronic bk.) 
020 |a 1523124377  |q (electronic bk.) 
020 |z 9781785616389  |q (hbk.) 
020 |z 1785616382  |q (hbk.) 
029 1 |a AU@  |b 000065477143 
029 1 |a AU@  |b 000065930112 
035 |a (OCoLC)1099985733  |z (OCoLC)1300706720 
050 4 |a QP517.B56  |b N38 2019 
082 0 4 |a 006.38 
049 |a UAMI 
245 0 0 |a Nature-inspired cyber security and resiliency :  |b fundamentals, techniques and applications /  |c edited by El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk. 
264 1 |a Stevenage :  |b Institution of Engineering & Technology,  |c 2019. 
264 4 |c ©2019 
300 |a 1 online resource (xx, 454 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a IET security series ;  |v 10 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
505 0 |a Intro; Contents; Preface; About the editors; 1. Nature-inspired analogies and metaphors for cyber security / Elzbieta Rzeszutko and Wojciech Mazurczyk; 1.1 Historical examples of the nature-inspired inventions; 1.2 Classification of the nature-inspired inventions; 1.3 Nature-inspired analogies and metaphors for cyber security: needed or not?; 1.3.1 Adaptability as a key factor in nature; 1.4 Cyber security ecology; 1.4.1 Cyber ecosystem; 1.4.2 Cyber-ecology and its subtypes; 1.4.3 Cyber ecosystem interactions; 1.5 Early nature-inspired terminology in cyber security 
505 8 |a 1.6 Recent nature-inspired analogies and metaphors for cyber security1.6.1 Nature-inspired cyber security inspired by an organism's characteristic feature/defence mechanism; 1.6.2 Nature-inspired cyber security inspired by organisms' interactions; 1.6.3 Generalised attack scenario analogy; 1.7 Conclusion and outlook; References; 2. When to turn to nature-inspired solutions for cyber systems / Nina H. Fefferman; 2.1 Why natural systems are tempting; 2.1.1 Analogous qualities in engineered cyber systems; 2.2 How biological systems develop solutions; 2.2.1 Darwinian evolution 
505 8 |a 2.2.2 Avoiding a common trap: best may not be good2.2.3 Does this make natural systems poor sources of inspiration?; 2.3 Evidence of success from nature-inspired efforts; 2.3.1 A standard pattern in nature-inspired design research; 2.4 A few of nature's tools; 2.4.1 Proximate cues; 2.4.2 Distributed decisions; 2.4.3 Error convergence; 2.5 Synergy among nature's tools; 2.6 Potential pitfalls in nature-inspired algorithms specific to cyber security and resilience; 2.6.1 Coevolutionary arms races; 2.6.2 Designed threats versus evolved threats 
505 8 |a 2.6.3 Trade-offs between security and privacy may be different for each design component2.7 When NOT to use nature-inspired algorithms; 2.8 Conclusions; Acknowledgments; References; 3. Bioinspired collaboration and cyber security / Youna Jung; 3.1 Collaboration; 3.1.1 Computer-supported cooperative work; 3.1.2 Service-oriented architecture; 3.1.3 Online social networks; 3.1.4 Multi-agent systems; 3.2 Bioinspired cooperation; 3.2.1 Cooperation in swarm intelligence; 3.2.2 Coordination in chemistry; 3.3 Access control for bioinspired cooperation; 3.3.1 Traditional access control models 
505 8 |a 3.3.2 Access control models for bioinspired collaboration3.4 Conclusions and future work; References; 4. Immune-based defence and resiliency / Pierre Parrend; 4.1 Introduction; 4.2 Definitions; 4.3 Core contributions; 4.3.1 Immunity basics; 4.3.2 Complexity aspects of the immune system; 4.3.3 Immune properties of natural organisms; 4.4 Applications; 4.4.1 Immuno-engineering; 4.4.2 Artificial immune systems; 4.4.3 AIS for intrusion detection; 4.4.4 Immune properties of artificial systems; 4.4.5 Limitations and perspectives of AIS applications; 4.5 Conclusions and perspectives; References 
505 8 |a 5. Bio-inspired approaches for security and resiliency of network traffic / Christopher S. Oehmen and Elena S. Peterson 
520 |a This is a timely review of the fundamentals, the latest developments and the diverse applications of nature-inspired algorithms in cyber security and resiliency. Based on concepts from natural processes, phenomena and organisms, it presents novel methodologies to cope with cyber security challenges. 
590 |a Knovel  |b ACADEMIC - Software Engineering 
590 |a Knovel  |b ACADEMIC - Computer Hardware Engineering 
650 0 |a Biomimetics. 
650 0 |a Computer security. 
650 2 |a Biomimetics 
650 2 |a Computer Security 
650 6 |a Chimie biomimétique. 
650 6 |a Sécurité informatique. 
650 7 |a Biomimetics.  |2 fast  |0 (OCoLC)fst00832620 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a biomimetics.  |2 inspect 
650 7 |a fault tolerant computing.  |2 inspect 
650 7 |a security of data.  |2 inspect 
650 7 |a trusted computing.  |2 inspect 
700 1 |a El-Alfy, El Sayed M.,  |d 1968-  |e editor. 
700 1 |a Eltoweissy, Mohamed,  |e editor. 
700 1 |a Fulp, Errin W.,  |e editor. 
700 1 |a Mazurczyk, Wojciech,  |e editor. 
776 0 8 |i Print version:  |a El-Alfy, El-Sayed M.  |t Nature-Inspired Cyber Security and Resiliency : Fundamentals, Techniques and Applications.  |d Stevenage : Institution of Engineering & Technology, ©2019  |z 9781785616389 
830 0 |a IET security series ;  |v 10. 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpNICSRFT2/toc  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH34690406 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5760539 
938 |a EBSCOhost  |b EBSC  |n 2103539 
938 |a YBP Library Services  |b YANK  |n 300481668 
994 |a 92  |b IZTAP