Buy Game Theory and Machine Learning for Cyber Security by Christopher D. Kiekintveld
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Data encryption > Game Theory and Machine Learning for Cyber Security
Game Theory and Machine Learning for Cyber Security

Game Theory and Machine Learning for Cyber Security


     0     
5
4
3
2
1



Available


X
About the Book

GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY

Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field

In Game Theory and Machine Learning for Cyber Security, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security.

Readers will explore the vulnerabilities of traditional machine learning algorithms and how they can be mitigated in an adversarial machine learning approach. The book offers a comprehensive suite of solutions to a broad range of technical issues in applying game theory and machine learning to solve cyber security challenges.

Beginning with an introduction to foundational concepts in game theory, machine learning, cyber security, and cyber deception, the editors provide readers with resources that discuss the latest in hypergames, behavioral game theory, adversarial machine learning, generative adversarial networks, and multi-agent reinforcement learning.

Readers will also enjoy:

  • A thorough introduction to game theory for cyber deception, including scalable algorithms for identifying stealthy attackers in a game theoretic framework, honeypot allocation over attack graphs, and behavioral games for cyber deception
  • An exploration of game theory for cyber security, including actionable game-theoretic adversarial intervention detection against advanced persistent threats
  • Practical discussions of adversarial machine learning for cyber security, including adversarial machine learning in 5G security and machine learning-driven fault injection in cyber-physical systems
  • In-depth examinations of generative models for cyber security

Perfect for researchers, students, and experts in the fields of computer science and engineering, Game Theory and Machine Learning for Cyber Security is also an indispensable resource for industry professionals, military personnel, researchers, faculty, and students with an interest in cyber security.



Table of Contents:

Editor biographies

Contributors

Foreword

Preface

 

Chapter 1:           Introduction

Christopher D. Kiekintveld, Charles A. Kamhoua, Fei Fang, Quanyan Zhu

 

Part 1:   Game Theory for Cyber Deception

 

Chapter 2:           Introduction to Game Theory

Fei Fang, Shutian Liu, Anjon Basak, Quanyan Zhu, Christopher Kiekintveld, Charles A. Kamhoua

 

Chapter 3:           Scalable Algorithms for Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception

Anjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld

 

Chapter 4:           Honeypot Allocation Game over Attack Graphs for Cyber Deception

Ahmed H. Anwar, Charles Kamhoua, Nandi Leslie, Christopher Kiekintveld

 

Chapter 5:           Evaluating Adaptive Deception Strategies for Cyber Defense with Human Experimentation

Palvi Aggarwal, Marcus Gutierrez, Christopher Kiekintveld, Branislav Bosansky, Cleotilde Gonzalez

 

Chapter 6:           A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception

Jie Fu, Abhishek N. Kulkarni

 

Part 2:   Game Theory for Cyber Security

 

Chapter 7:           Minimax Detection (MAD) for Computer Security: A Dynamic Program Characterization

Muhammed O. Sayin, Dinuka Sahabandu, Muhammad Aneeq uz Zaman, Radha Poovendran, Tamer Başar

 

Chapter 8:           Sensor Manipulation Games in Cyber Security

João P. Hespanha

 

Chapter 9:           Adversarial Gaussian Process Regression in Sensor Networks

Yi Li, Xenofon Koutsoukos, Yevgeniy Vorobeychik

 

Chapter 10:        Moving Target Defense Games for Cyber Security: Theory and Applications Abdelrahman Eldosouky, Shamik Sengupta

 

Chapter 11:        Continuous Authentication Security Games

Serkan Saritas, Ezzeldin Shereen, Henrik Sandberg, Gyorgy Dan

Chapter 12:        Cyber Autonomy in Software Security: Techniques and Tactics

Tiffany Bao, Yan Shoshitaishvili

 

Part 3:   Adversarial Machine Learning for Cyber Security

 

Chapter 13:        A Game Theoretic Perspective on Adversarial Machine Learning and Related Cybersecurity Applications

Yan Zhou, Murat Kantarcioglu, Bowei Xi

 

Chapter 14:        Adversarial Machine Learning in 5G Communications Security

Yalin Sagduyu, Tugba Erpek, Yi Shi

 

Chapter 15:        Machine Learning in the Hands of a Malicious Adversary: A Near Future If Not Reality Keywhan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T. Kalbarczyk, Thenkurussi Kesavadas, Ravishankar K. Iyer

 

Chapter 16:        Trinity: Trust, Resilience and Interpretability of Machine Learning Models

Susmit Jha, Anirban Roy, Brian Jalaian, Gunjan Verma

 

Part 4:   Generative Models for Cyber Security

 

Chapter 17:        Evading Machine Learning based Network Intrusion Detection Systems with GANs Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Mike Weisman

 

Chapter 18:        Concealment Charm (ConcealGAN): Automatic Generation of Steganographic Text using Generative Models to Bypass Censorship

Nurpeiis Baimukan, Quanyan Zhu

 

Part 5:   Reinforcement Learning for Cyber Security

 

Chapter 19:        Manipulating Reinforcement Learning: Stealthy Attacks on Cost Signals

Yunhan Huang, Quanyan Zhu

 

Chapter 20:        Resource-Aware Intrusion Response based on Deep Reinforcement Learning for Software-Defined Internet-of-Battle-Things

Seunghyun Yoon, Jin-Hee Cho, Gaurav Dixit, Ing-Ray Chen

 

Part 6:   Other Machine Learning approach to Cyber Security

 

Chapter 21:        Smart Internet Probing: Scanning Using Adaptive Machine Learning

Armin Sarabi, Kun Jin, Mingyan Liu

 

Chapter 22:        Semi-automated Parameterization of a Probabilistic Model using Logistic Regression - A Tutorial

Stefan Rass, Sandra König, Stefan Schauer

 

Chapter 23:        Resilient Distributed Adaptive Cyber-Defense using Blockchain

George Cybenko, Roger A. Hallman

 

Chapter 24:        Summary and Future Work

Quanyan Zhu, Fei Fang



About the Author :

Charles A. Kamhoua, PhD, is a researcher at the United States Army Research Laboratory’s Network Security Branch. He is co-editor of Assured Cloud Computing (2018) and Blockchain for Distributed Systems Security (2019), and Modeling and Design of Secure Internet of Things (2020).

Christopher D. Kiekintveld, PhD, is Associate Professor at the University of Texas at El Paso. He is Director of Graduate Programs with the Computer Science Department.

Fei Fang, PhD, is Assistant Professor in the Institute for Software Research at the School of Computer Science at Carnegie Mellon University.

Quanyan Zhu, PhD, is Associate Professor in the Department of Electrical and Computer Engineering at New York University.


Best Sellers


Product Details
  • ISBN-13: 9781119723929
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-IEEE Press
  • Height: 10 mm
  • No of Pages: 544
  • Returnable: N
  • Weight: 454 gr
  • ISBN-10: 1119723922
  • Publisher Date: 05 Nov 2021
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 10 mm
  • Width: 10 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Game Theory and Machine Learning for Cyber Security
John Wiley & Sons Inc -
Game Theory and Machine Learning for Cyber Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Game Theory and Machine Learning for Cyber Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!