0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (6)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Adaptive Autonomous Secure Cyber Systems (Hardcover, 1st ed. 2020): Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin... Adaptive Autonomous Secure Cyber Systems (Hardcover, 1st ed. 2020)
Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R4,269 Discovery Miles 42 690 Ships in 12 - 17 working days

This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system. This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment. Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security. This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.

Linear Algebra for Signal Processing (Hardcover, 1995 ed.): Adam Bojanczyk, George Cybenko Linear Algebra for Signal Processing (Hardcover, 1995 ed.)
Adam Bojanczyk, George Cybenko
R4,302 Discovery Miles 43 020 Ships in 12 - 17 working days

Signal processing applications have burgeoned in the past decade. During the same time, signal processing techniques have matured rapidly and now include tools from many areas of mathematics, computer science, physics, and engineering. This trend will continue as many new signal processing applications are opening up in consumer products and communications systems.
In particular, signal processing has been making increasingly sophisticated use of linear algebra on both theoretical and algorithmic fronts. This volume gives particular emphasis to exposing broader contexts of the signal processing problems so that the impact of algorithms and hardware can be better understood; it brings together the writings of signal processing engineers, computer engineers, and applied linear algebraists in an exchange of problems, theories, and techniques. This volume will be of interest to both applied mathematicians and engineers.

The Mathematics of Information Coding, Extraction and Distribution (Hardcover, 1999 ed.): George Cybenko, Dianne P... The Mathematics of Information Coding, Extraction and Distribution (Hardcover, 1999 ed.)
George Cybenko, Dianne P O'Leary, Jorma Rissanen
R2,870 Discovery Miles 28 700 Ships in 10 - 15 working days

High performance computing consumes and generates vast amounts of data, and the storage, retrieval, and transmission of this data are major obstacles to effective use of computing power. Challenges inherent in all of these operations are security, speed, reliability, authentication and reproducibility. This workshop focused on a wide variety of technical results aimed at meeting these challenges. Topics ranging from the mathematics of coding theory to the practicalities of copyright preservation for Internet resources drew spirited discussion and interaction among experts in diverse but related fields. We hope this volume contributes to continuing this dialogue.

Adaptive Autonomous Secure Cyber Systems (Paperback, 1st ed. 2020): Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin... Adaptive Autonomous Secure Cyber Systems (Paperback, 1st ed. 2020)
Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R4,446 Discovery Miles 44 460 Ships in 10 - 15 working days

This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system. This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment. Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security. This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.

The Mathematics of Information Coding, Extraction and Distribution (Paperback, Softcover reprint of the original 1st ed. 1999):... The Mathematics of Information Coding, Extraction and Distribution (Paperback, Softcover reprint of the original 1st ed. 1999)
George Cybenko, Dianne P O'Leary, Jorma Rissanen
R2,747 Discovery Miles 27 470 Ships in 10 - 15 working days

High performance computing consumes and generates vast amounts of data, and the storage, retrieval, and transmission of this data are major obstacles to effective use of computing power. Challenges inherent in all of these operations are security, speed, reliability, authentication and reproducibility. This workshop focused on a wide variety of technical results aimed at meeting these challenges. Topics ranging from the mathematics of coding theory to the practicalities of copyright preservation for Internet resources drew spirited discussion and interaction among experts in diverse but related fields. We hope this volume contributes to continuing this dialogue.

Linear Algebra for Signal Processing (Paperback, Softcover reprint of the original 1st ed. 1995): Adam Bojanczyk, George Cybenko Linear Algebra for Signal Processing (Paperback, Softcover reprint of the original 1st ed. 1995)
Adam Bojanczyk, George Cybenko
R4,201 Discovery Miles 42 010 Ships in 10 - 15 working days

Signal processing applications have burgeoned in the past decade. During the same time, signal processing techniques have matured rapidly and now include tools from many areas of mathematics, computer science, physics, and engineering. This trend will continue as many new signal processing applications are opening up in consumer products and communications systems.
In particular, signal processing has been making increasingly sophisticated use of linear algebra on both theoretical and algorithmic fronts. This volume gives particular emphasis to exposing broader contexts of the signal processing problems so that the impact of algorithms and hardware can be better understood; it brings together the writings of signal processing engineers, computer engineers, and applied linear algebraists in an exchange of problems, theories, and techniques. This volume will be of interest to both applied mathematicians and engineers.

Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security... Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security (Paperback, 1st ed. 2019)
Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
R1,709 Discovery Miles 17 090 Ships in 10 - 15 working days

Today's cyber defenses are largely static allowing adversaries to pre-plan their attacks. In response to this situation, researchers have started to investigate various methods that make networked information systems less homogeneous and less predictable by engineering systems that have homogeneous functionalities but randomized manifestations. The 10 papers included in this State-of-the Art Survey present recent advances made by a large team of researchers working on the same US Department of Defense Multidisciplinary University Research Initiative (MURI) project during 2013-2019. This project has developed a new class of technologies called Adaptive Cyber Defense (ACD) by building on two active but heretofore separate research areas: Adaptation Techniques (AT) and Adversarial Reasoning (AR). AT methods introduce diversity and uncertainty into networks, applications, and hosts. AR combines machine learning, behavioral science, operations research, control theory, and game theory to address the goal of computing effective strategies in dynamic, adversarial environments.

Graphical Models for Security - 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers... Graphical Models for Security - 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
George Cybenko, David Pym, Barbara Fila
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security, GraMSec 2018, held in Oxford, UK, in July 2018. The 7 full papers presented in this volume were carefully reviewed and selected from 21 submissions. The book also contains one invited talk. The contributions deal with the latest research and developments on graphical models for security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Efekto 77300-P Nitrile Gloves (L)(Pink)
R63 Discovery Miles 630
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Bostik Clear (50ml)
R57 Discovery Miles 570
Sylvanian Families - Walnut Squirrel…
R598 Discovery Miles 5 980
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Moto-Quip Short Aluminium Handled…
R69 Discovery Miles 690
A Court Of Thorns And Roses: 5-Book…
Sarah J. Maas Paperback R1,250 R968 Discovery Miles 9 680
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950

 

Partners