Udvidet returret til d. 31. januar 2025

Bøger af Cliff Wang

Filter
Filter
Sorter efterSorter Populære
  • af Cliff Wang
    1.589,95 kr.

    The rapid growth and reliance on cyber systems have permeated our society, government, and military which is demonstrated in this book. The authors discuss how AI-powered cyber systems are designed to protect against cyber threats and ensure the security and reliability of digital systems using artificial intelligence (AI) technologies. As AI becomes more integrated into various aspects of our lives, the need for reliable and trustworthy AI systems becomes increasingly important. This book is an introduction to all of the above-mentioned areas in the context of AI Embedded Assurance for Cyber Systems.This book has three themes. First, the AI/ML for digital forensics theme focuses on developing AI and ML powered forensic tools, techniques, software, and hardware. Second, the AI/ML for cyber physical system theme describes that AI/ML plays an enabling role to boost the development of cyber physical systems (CPS), especially in strengthening the security and privacy ofCPS. Third, the AI/ML for cyber analysis theme focuses on using AI/ML to analyze tons of data in a timely manner and identify many complex threat patterns.This book is designed for undergraduates, graduate students in computer science and researchers in an interdisciplinary area of cyber forensics and AI embedded security applications. It is also useful for practitioners who would like to adopt AIs to solve cyber security problems.

  • af Cliff Wang, Milind Tambe & Tiffany Bao
    1.685,95 kr.

    This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: Understanding human¿s cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human¿s behaviorsDesigning deceptive techniques that supports the enforcement of deceptive strategiesThe research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception.Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity.Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

  • af Mohammad Tehranipoor & Cliff Wang
    1.797,95 kr.

  • af Cliff Wang, Dawn Song, Somesh Jha, mfl.
    3.224,95 kr.

  • - Countering the Largest Security Threat
    af Wenke Lee
    1.100,95 - 1.660,95 kr.

    Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat.Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based on the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets. It provides botnet detection techniques and response strategies, as well as the latest results from leading academic, industry and government researchers.Botnet Detection: Countering the Largest Security Threat is intended for researchers and practitioners in industry. This book is also appropriate as a secondary text or reference book for advanced-level students in computer science. 

  • af Benjamin S. Riggan, Wesley E. Snyder & Cliff Wang
    553,95 kr.

    This SpringerBrief explores graphical password systems and examines novel drawing-based methods in terms of security, usability, and human computer-interactions. It provides a systematic approach for recognizing, comparing, and matching sketch-based passwords in the context of modern computing systems. The book offers both a security and usability analysis of the accumulative framework used for incorporating handwriting biometrics and a human computer-interaction performance analysis. The chapters offer new perspectives and experimental results regarding model uniqueness, recognition tolerance, and the human-computer interaction. The results demonstrate that biometrics reduce the equal error rate (EER) by more than 10%, and show that people are capable of accurately reproducing a sketch-based password. Fundamentals of Sketch-based Passwords: A General Framework targets computer scientists and engineers focused on computer security, biometrics, and human factors. Advanced-level students in computer science and electrical engineering will find this material useful as a study guide for their classes.

  • - Reasoning, Adaptive Planning, and Evaluation of HoneyThings
    af Ehab Al-Shaer, Cliff Wang, Jinpeng Wei & mfl.
    816,95 kr.

    It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter.

  • af Cliff Wang, Wenye Wang & Zhou Lu
    667,95 kr.

    An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.