1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems.- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges.- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense.- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint.- 5. A framework for studying autonomic computing models in cyber deception.- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis.- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions.- 8. Plan Interdiction Games.- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance.- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense.- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies.- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains.- 13. An Empirical Study of Secret Security Patch in Open Source Software.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
(nessuna copia disponibile)
Cerca: Inserisci un desiderataNon riesci a trovare il libro che stai cercando? Continueremo a cercarlo per te. Se uno dei nostri librai lo aggiunge ad AbeBooks, ti invieremo una notifica!
Inserisci un desiderata