0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Cognitive Security - A System-Scientific Approach (1st ed. 2023): Linan Huang, Quanyan Zhu Cognitive Security - A System-Scientific Approach (1st ed. 2023)
Linan Huang, Quanyan Zhu
R1,503 Discovery Miles 15 030 Ships in 10 - 15 working days

This book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise. This book demonstrates that as adversaries increasingly use manipulative and deceptive information to disrupt human cognitive processes, including sensation, attention, memory, and mental operations, humans are misled into fallacious reasoning and manipulated decisions that can lead to system-level meltdown. Cognitive security aims to protect humans from the exploitation of cognitive vulnerabilities, help them make informed decisions that are free from manipulation and undue influence, and mitigate the aggravating risk in the ensuing steps of the attacker’s kill chain. This book offers solutions that work across different fields, such as psychology, neuroscience, data science, social science, and game theory, to deal with cognitive threats. It guides the reader through the core ideas with figures, real-life examples, and case studies. Moreover, it formally defines all research questions, presents the results using mathematical theorems and proofs, and obtains insights through numerical validation. This book provides a self-contained and brief overview of essential system-scientific tools for modeling, analyzing, and mitigating cognitive vulnerabilities. The concepts of human cognitive capacities and cognitive vulnerabilities are formally discussed, followed by two case studies in the scenarios of reactive and proactive attention vulnerabilities. This book provides insights and applications on this transdisciplinary topic, with the goal of motivating future research in this emerging area and pushing the frontier of human-technology convergence. This book is a valuable reference for researchers and advanced-level students studying or working in cognitive security and related fields. It is also useful for decision-makers, managers, and professionals working within these related fields.

Cyber-Security Threats and Response Models in Nuclear Power Plants (Paperback, 1st ed. 2022): Carol Smidts, Indrajit Ray,... Cyber-Security Threats and Response Models in Nuclear Power Plants (Paperback, 1st ed. 2022)
Carol Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao, …
R1,370 Discovery Miles 13 700 Ships in 10 - 15 working days

This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well. A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well. This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Salton 3 Bar Heater
R613 Discovery Miles 6 130
Elecstor 18W In-Line UPS (Black)
R999 R869 Discovery Miles 8 690
Jumbo Puzzle Mates Puzzle & Roll Storage…
 (4)
R699 R419 Discovery Miles 4 190
Bug-A-Salt 3.0 Black Fly
 (1)
R999 Discovery Miles 9 990
Docking Edition Multi-Functional…
R1,099 R799 Discovery Miles 7 990
Finding Dory
Ellen DeGeneres, Albert Brooks, … Blu-ray disc  (1)
R42 Discovery Miles 420
This Is Why
Paramore CD R397 Discovery Miles 3 970
Sony PlayStation Portal Remote Player…
R5,299 Discovery Miles 52 990
Barbie
Margot Robbie, Ryan Gosling Blu-ray disc R266 Discovery Miles 2 660
Sylvanian Families Country Tree School
 (7)
R2,759 Discovery Miles 27 590

 

Partners