Cyber Warfare Building the Scientific Foundation

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, pro...

Full description

Bibliographic Details
Other Authors: Jajodia, Sushil (Editor), Shakarian, Paulo (Editor), Subrahmanian, V.S. (Editor), Swarup, Vipin (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2015, 2015
Edition:1st ed. 2015
Series:Advances in Information Security
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03236nmm a2200397 u 4500
001 EB001030914
003 EBX01000000000000000824467
005 00000000000000.0
007 cr|||||||||||||||||||||
008 150508 ||| eng
020 |a 9783319140391 
100 1 |a Jajodia, Sushil  |e [editor] 
245 0 0 |a Cyber Warfare  |h Elektronische Ressource  |b Building the Scientific Foundation  |c edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang 
250 |a 1st ed. 2015 
260 |a Cham  |b Springer International Publishing  |c 2015, 2015 
300 |a XIII, 321 p. 83 illus., 49 illus. in color  |b online resource 
505 0 |a Cyber War Games -- Alternatives to Cyber Warfare: Deterrence and Assurance -- Identifying and Exploiting the Cyber High Ground with Botnets -- Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberfare -- Game-theoretic Foundations for the Strategic Use of Honeypots in Network Security -- Cyber Counterdeception: How to Detect Denial & Deception -- Automated Adversary Profiling -- Cyber Attribution: An Argumentation-Based Approach -- The Human Factor in Cybersecurity: Robust & Intelligent Defense -- CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War -- Active Discovery of Hidden Profiles in Social Networks using Malware -- A Survery of Community Detection Algorithms Based on Analysis-Intent -- Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks -- Graph Mining for Cyber Security -- Programming language theoretic security in the real world: a mirage or the future? 
653 |a Computer Communication Networks 
653 |a Cryptography 
653 |a Application software 
653 |a Computer networks  
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Computer and Information Systems Applications 
653 |a Data and Information Security 
700 1 |a Shakarian, Paulo  |e [editor] 
700 1 |a Subrahmanian, V.S.  |e [editor] 
700 1 |a Swarup, Vipin  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Advances in Information Security 
028 5 0 |a 10.1007/978-3-319-14039-1 
856 4 0 |u https://doi.org/10.1007/978-3-319-14039-1?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference