LDR | | 05796cmm u2200661Ii 4500 |
001 | | 000000314649 |
003 | | OCoLC |
005 | | 20230525164956 |
006 | | m d |
007 | | cr |n||||||||| |
008 | | 190504s2019 enk ob 001 0 eng d |
020 | |
▼a 1785616390 |
020 | |
▼a 9781785616396
▼q (electronic bk.) |
020 | |
▼z 9781785616389
▼q (hbk.) |
020 | |
▼z 1785616382
▼q (hbk.) |
035 | |
▼a 2103539
▼b (N$T) |
035 | |
▼a (OCoLC)1099985733 |
040 | |
▼a EBLCP
▼b eng
▼c EBLCP
▼d STF
▼d OCLCO
▼d UKAHL
▼d CDN
▼d OCLCF
▼d UIU
▼d N$T
▼d 248032 |
049 | |
▼a MAIN |
050 | 4 |
▼a QP517.B56
▼b N38 2019 |
082 | 04 |
▼a 006.38 |
245 | 00 |
▼a Nature-inspired cyber security and resiliency :
▼b fundamentals, techniques and applications /
▼c edited by El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk.
▼h [electronic resource] |
260 | 1 |
▼a Stevenage :
▼b Institution of Engineering & Technology,
▼c 2019. |
300 | |
▼a 1 online resource (xx, 454 pages). |
336 | |
▼a text
▼b txt
▼2 rdacontent |
337 | |
▼a computer
▼b c
▼2 rdamedia |
338 | |
▼a online resource
▼b cr
▼2 rdacarrier |
490 | 1 |
▼a IET security series ;
▼v 10. |
504 | |
▼a Includes bibliographical references and index. |
505 | 0 |
▼a Intro; Contents; Preface; About the editors; 1. Nature-inspired analogies and metaphors for cyber security / Elzbieta Rzeszutko and Wojciech Mazurczyk; 1.1 Historical examples of the nature-inspired inventions; 1.2 Classification of the nature-inspired inventions; 1.3 Nature-inspired analogies and metaphors for cyber security: needed or not?; 1.3.1 Adaptability as a key factor in nature; 1.4 Cyber security ecology; 1.4.1 Cyber ecosystem; 1.4.2 Cyber-ecology and its subtypes; 1.4.3 Cyber ecosystem interactions; 1.5 Early nature-inspired terminology in cyber security |
505 | 8 |
▼a 1.6 Recent nature-inspired analogies and metaphors for cyber security1.6.1 Nature-inspired cyber security inspired by an organism's characteristic feature/defence mechanism; 1.6.2 Nature-inspired cyber security inspired by organisms' interactions; 1.6.3 Generalised attack scenario analogy; 1.7 Conclusion and outlook; References; 2. When to turn to nature-inspired solutions for cyber systems / Nina H. Fefferman; 2.1 Why natural systems are tempting; 2.1.1 Analogous qualities in engineered cyber systems; 2.2 How biological systems develop solutions; 2.2.1 Darwinian evolution |
505 | 8 |
▼a 2.2.2 Avoiding a common trap: best may not be good2.2.3 Does this make natural systems poor sources of inspiration?; 2.3 Evidence of success from nature-inspired efforts; 2.3.1 A standard pattern in nature-inspired design research; 2.4 A few of nature's tools; 2.4.1 Proximate cues; 2.4.2 Distributed decisions; 2.4.3 Error convergence; 2.5 Synergy among nature's tools; 2.6 Potential pitfalls in nature-inspired algorithms specific to cyber security and resilience; 2.6.1 Coevolutionary arms races; 2.6.2 Designed threats versus evolved threats |
505 | 8 |
▼a 2.6.3 Trade-offs between security and privacy may be different for each design component2.7 When NOT to use nature-inspired algorithms; 2.8 Conclusions; Acknowledgments; References; 3. Bioinspired collaboration and cyber security / Youna Jung; 3.1 Collaboration; 3.1.1 Computer-supported cooperative work; 3.1.2 Service-oriented architecture; 3.1.3 Online social networks; 3.1.4 Multi-agent systems; 3.2 Bioinspired cooperation; 3.2.1 Cooperation in swarm intelligence; 3.2.2 Coordination in chemistry; 3.3 Access control for bioinspired cooperation; 3.3.1 Traditional access control models |
505 | 8 |
▼a 3.3.2 Access control models for bioinspired collaboration3.4 Conclusions and future work; References; 4. Immune-based defence and resiliency / Pierre Parrend; 4.1 Introduction; 4.2 Definitions; 4.3 Core contributions; 4.3.1 Immunity basics; 4.3.2 Complexity aspects of the immune system; 4.3.3 Immune properties of natural organisms; 4.4 Applications; 4.4.1 Immuno-engineering; 4.4.2 Artificial immune systems; 4.4.3 AIS for intrusion detection; 4.4.4 Immune properties of artificial systems; 4.4.5 Limitations and perspectives of AIS applications; 4.5 Conclusions and perspectives; References |
505 | 8 |
▼a 5. Bio-inspired approaches for security and resiliency of network traffic / Christopher S. Oehmen and Elena S. Peterson |
520 | |
▼a This is a timely review of the fundamentals, the latest developments and the diverse applications of nature-inspired algorithms in cyber security and resiliency. Based on concepts from natural processes, phenomena and organisms, it presents novel methodologies to cope with cyber security challenges. |
588 | 0 |
▼a Print version record. |
590 | |
▼a Added to collection customer.56279.3 |
650 | 0 |
▼a Biomimetics. |
650 | 0 |
▼a Computer security. |
650 | 7 |
▼a Biomimetics.
▼2 fast
▼0 (OCoLC)fst00832620 |
650 | 7 |
▼a Computer security.
▼2 fast
▼0 (OCoLC)fst00872484 |
650 | 7 |
▼a biomimetics.
▼2 inspect |
650 | 7 |
▼a fault tolerant computing.
▼2 inspect |
650 | 7 |
▼a security of data.
▼2 inspect |
650 | 7 |
▼a trusted computing.
▼2 inspect |
655 | 4 |
▼a Electronic books. |
700 | 1 |
▼a El-Alfy, El-Sayed M.,
▼e editor. |
700 | 1 |
▼a Eltoweissy, Mohamed.,
▼e editor |
700 | 1 |
▼a Fulp, Errin W.,
▼e editor |
700 | 1 |
▼a Mazurczyk, Wojciech,
▼e editor. |
776 | 08 |
▼i Print version:
▼a El-Alfy, El-Sayed M.
▼t Nature-Inspired Cyber Security and Resiliency : Fundamentals, Techniques and Applications
▼d Stevenage : Institution of Engineering & Technology,c2019
▼z 9781785616389 |
830 | 0 |
▼a IET security series ;
▼v 10. |
856 | 40 |
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2103539 |
938 | |
▼a Askews and Holts Library Services
▼b ASKH
▼n AH34690406 |
938 | |
▼a EBL - Ebook Library
▼b EBLB
▼n EBL5760539 |
938 | |
▼a EBSCOhost
▼b EBSC
▼n 2103539 |
990 | |
▼a 관리자 |
994 | |
▼a 92
▼b N$T |