Game Theory and Machine Learning for Cyber Security
Home > Science, Technology & Agriculture > Electronics and communications engineering > Game Theory and Machine Learning for Cyber Security
Game Theory and Machine Learning for Cyber Security

Game Theory and Machine Learning for Cyber Security

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field In Game Theory and Machine Learning for Cyber Security, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security. Readers will explore the vulnerabilities of traditional machine learning algorithms and how they can be mitigated in an adversarial machine learning approach. The book offers a comprehensive suite of solutions to a broad range of technical issues in applying game theory and machine learning to solve cyber security challenges. Beginning with an introduction to foundational concepts in game theory, machine learning, cyber security, and cyber deception, the editors provide readers with resources that discuss the latest in hypergames, behavioral game theory, adversarial machine learning, generative adversarial networks, and multi-agent reinforcement learning. Readers will also enjoy: A thorough introduction to game theory for cyber deception, including scalable algorithms for identifying stealthy attackers in a game theoretic framework, honeypot allocation over attack graphs, and behavioral games for cyber deception An exploration of game theory for cyber security, including actionable game-theoretic adversarial intervention detection against advanced persistent threats Practical discussions of adversarial machine learning for cyber security, including adversarial machine learning in 5G security and machine learning-driven fault injection in cyber-physical systems In-depth examinations of generative models for cyber security Perfect for researchers, students, and experts in the fields of computer science and engineering, Game Theory and Machine Learning for Cyber Security is also an indispensable resource for industry professionals, military personnel, researchers, faculty, and students with an interest in cyber security.

Table of Contents:
Editor biographies Contributors Foreword Preface   Chapter 1:           Introduction Christopher D. Kiekintveld, Charles A. Kamhoua, Fei Fang, Quanyan Zhu   Part 1:   Game Theory for Cyber Deception   Chapter 2:           Introduction to Game Theory Fei Fang, Shutian Liu, Anjon Basak, Quanyan Zhu, Christopher Kiekintveld, Charles A. Kamhoua   Chapter 3:           Scalable Algorithms for Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception Anjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld   Chapter 4:           Honeypot Allocation Game over Attack Graphs for Cyber Deception Ahmed H. Anwar, Charles Kamhoua, Nandi Leslie, Christopher Kiekintveld   Chapter 5:           Evaluating Adaptive Deception Strategies for Cyber Defense with Human Experimentation Palvi Aggarwal, Marcus Gutierrez, Christopher Kiekintveld, Branislav Bosansky, Cleotilde Gonzalez   Chapter 6:           A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception Jie Fu, Abhishek N. Kulkarni   Part 2:   Game Theory for Cyber Security   Chapter 7:           Minimax Detection (MAD) for Computer Security: A Dynamic Program Characterization Muhammed O. Sayin, Dinuka Sahabandu, Muhammad Aneeq uz Zaman, Radha Poovendran, Tamer Başar   Chapter 8:           Sensor Manipulation Games in Cyber Security João P. Hespanha   Chapter 9:           Adversarial Gaussian Process Regression in Sensor Networks Yi Li, Xenofon Koutsoukos, Yevgeniy Vorobeychik   Chapter 10:        Moving Target Defense Games for Cyber Security: Theory and Applications Abdelrahman Eldosouky, Shamik Sengupta   Chapter 11:        Continuous Authentication Security Games Serkan Saritas, Ezzeldin Shereen, Henrik Sandberg, Gyorgy Dan Chapter 12:        Cyber Autonomy in Software Security: Techniques and Tactics Tiffany Bao, Yan Shoshitaishvili   Part 3:   Adversarial Machine Learning for Cyber Security   Chapter 13:        A Game Theoretic Perspective on Adversarial Machine Learning and Related Cybersecurity Applications Yan Zhou, Murat Kantarcioglu, Bowei Xi   Chapter 14:        Adversarial Machine Learning in 5G Communications Security Yalin Sagduyu, Tugba Erpek, Yi Shi   Chapter 15:        Machine Learning in the Hands of a Malicious Adversary: A Near Future If Not Reality Keywhan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T. Kalbarczyk, Thenkurussi Kesavadas, Ravishankar K. Iyer   Chapter 16:        Trinity: Trust, Resilience and Interpretability of Machine Learning Models Susmit Jha, Anirban Roy, Brian Jalaian, Gunjan Verma   Part 4:   Generative Models for Cyber Security   Chapter 17:        Evading Machine Learning based Network Intrusion Detection Systems with GANs Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Mike Weisman   Chapter 18:        Concealment Charm (ConcealGAN): Automatic Generation of Steganographic Text using Generative Models to Bypass Censorship Nurpeiis Baimukan, Quanyan Zhu   Part 5:   Reinforcement Learning for Cyber Security   Chapter 19:        Manipulating Reinforcement Learning: Stealthy Attacks on Cost Signals Yunhan Huang, Quanyan Zhu   Chapter 20:        Resource-Aware Intrusion Response based on Deep Reinforcement Learning for Software-Defined Internet-of-Battle-Things Seunghyun Yoon, Jin-Hee Cho, Gaurav Dixit, Ing-Ray Chen   Part 6:   Other Machine Learning approach to Cyber Security   Chapter 21:        Smart Internet Probing: Scanning Using Adaptive Machine Learning Armin Sarabi, Kun Jin, Mingyan Liu   Chapter 22:        Semi-automated Parameterization of a Probabilistic Model using Logistic Regression - A Tutorial Stefan Rass, Sandra König, Stefan Schauer   Chapter 23:        Resilient Distributed Adaptive Cyber-Defense using Blockchain George Cybenko, Roger A. Hallman   Chapter 24:        Summary and Future Work Quanyan Zhu, Fei Fang


Best Sellers


Product Details
  • ISBN-13: 9781119723943
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Standards Information Network
  • Language: English
  • ISBN-10: 1119723949
  • Publisher Date: 08 Sep 2021
  • Binding: Digital (delivered electronically)
  • No of Pages: 544


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Game Theory and Machine Learning for Cyber Security
John Wiley & Sons Inc -
Game Theory and Machine Learning for Cyber Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Game Theory and Machine Learning for Cyber Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!