0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (6)
  • R2,500 - R5,000 (22)
  • R5,000 - R10,000 (3)
  • -
Status
Brand

Showing 1 - 25 of 31 matches in All Departments

Detecting Trust and Deception in Group Interaction (Hardcover, 1st ed. 2021): V.S. Subrahmanian, Judee K. Burgoon, Norah E.... Detecting Trust and Deception in Group Interaction (Hardcover, 1st ed. 2021)
V.S. Subrahmanian, Judee K. Burgoon, Norah E. Dunbar
R3,017 Discovery Miles 30 170 Ships in 10 - 15 working days

This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game, based on the well-known Mafia and Resistance games, as well as selected other settings. This book develops statistical results linking different types of facial expressions (e.g. smile, pursed lips, raised eyebrows), vocal features (e.g., pitch, loudness) and linguistic features (e.g., dominant language, turn length) with both unary behaviors (e.g. is person X lying?) to binary behaviors (Is person X dominant compared to person Y? Does X trust Y? Does X like Y?). In addition, this book describes machine learning and computer vision-based algorithms that can be used to predict deception, as well as the visual focus of attention of people during discussions that can be linked to many binary behaviors. It is written by a multidisciplinary team of both social scientists and computer scientists. Meetings are at the very heart of human activity. Whether you are involved in a business meeting or in a diplomatic negotiation, such an event has multiple actors, some cooperative and some adversarial. Some actors may be deceptive, others may have complex relationships with others in the group. This book consists of a set of 11 chapters that describe the factors that link human behavior in group settings and attitudes to facial and voice characteristics. Researchers working in social sciences (communication, psychology, cognitive science) with an interest in studying the link between human interpersonal behavior and facial/speech/linguistic characteristics will be interested in this book. Computer scientists, who are interested in developing machine learning and deep learning based models of human behavior in group settings will also be interested in purchasing this book.

Cyber Deception - Building the Scientific Foundation (Hardcover, 1st ed. 2016): Sushil Jajodia, V.S. Subrahmanian, Vipin... Cyber Deception - Building the Scientific Foundation (Hardcover, 1st ed. 2016)
Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
R5,669 Discovery Miles 56 690 Ships in 12 - 17 working days

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.

Geospatial Abduction - Principles and Practice (Hardcover, 2011 ed.): Paulo Shakarian, V.S. Subrahmanian Geospatial Abduction - Principles and Practice (Hardcover, 2011 ed.)
Paulo Shakarian, V.S. Subrahmanian
R1,580 Discovery Miles 15 800 Ships in 10 - 15 working days

Imagine yourself as a military officer in a conflict zone trying to identify locations of weapons caches supporting road-side bomb attacks on your country's troops. Or imagine yourself as a public health expert trying to identify the location of contaminated water that is causing diarrheal diseases in a local population. Geospatial abduction is a new technique introduced by the authors that allows such problems to be solved. Geospatial Abduction provides the mathematics underlying geospatial abduction and the algorithms to solve them in practice; it has wide applicability and can be used by practitioners and researchers in many different fields. Real-world applications of geospatial abduction to military problems are included. Compelling examples drawn from other domains as diverse as criminology, epidemiology and archaeology are covered as well. This book also includes access to a dedicated website on geospatial abduction hosted by University of Maryland. Geospatial Abduction targets practitioners working in general AI, game theory, linear programming, data mining, machine learning, and more. Those working in the fields of computer science, mathematics, geoinformation, geological and biological science will also find this book valuable.

Adaptive Autonomous Secure Cyber Systems (Hardcover, 1st ed. 2020): Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin... Adaptive Autonomous Secure Cyber Systems (Hardcover, 1st ed. 2020)
Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R4,552 Discovery Miles 45 520 Ships in 12 - 17 working days

This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system. This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment. Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security. This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba (Hardcover, 2013 ed.): V.S. Subrahmanian, Aaron Mannes, Amy Sliva,... Computational Analysis of Terrorist Groups: Lashkar-e-Taiba (Hardcover, 2013 ed.)
V.S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
R3,540 Discovery Miles 35 400 Ships in 10 - 15 working days

"Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates.After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda.

"Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "is the first book that demonstrates how to use modern computational analysis techniques including methods for "big data" analysis. This book presents how to quantify both the environment in which LeT operate, and the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations.This book also provides a detailed history of Lashkar-e-Taiba based on extensive analysis conducted by using open source information and public statements. Each chapter includes a case study, as well as a slide describing the key results which are available on the authors' web sites.

"Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "is designed for a professional market composed of government or military workers, researchers and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book."

Cyber Warfare - Building the Scientific Foundation (Hardcover, 2015 ed.): Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian,... Cyber Warfare - Building the Scientific Foundation (Hardcover, 2015 ed.)
Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
R4,316 Discovery Miles 43 160 Ships in 12 - 17 working days

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference.

Multimedia Information Systems (Hardcover, Reprinted from MULTIMEDIA TOOLS AND APPLICATIONS, 7:1-2, 1998): V.S. Subrahmanian,... Multimedia Information Systems (Hardcover, Reprinted from MULTIMEDIA TOOLS AND APPLICATIONS, 7:1-2, 1998)
V.S. Subrahmanian, Satish K. Tripathi
R3,090 Discovery Miles 30 900 Ships in 10 - 15 working days

Multimedia Information Systems brings together in one place important contributions and up-to-date research results in this fast moving area. Multimedia Information Systems serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

A Machine Learning Based Model of Boko Haram (Hardcover, 1st ed. 2021): V.S. Subrahmanian, Chiara Pulice, James F. Brown, Jacob... A Machine Learning Based Model of Boko Haram (Hardcover, 1st ed. 2021)
V.S. Subrahmanian, Chiara Pulice, James F. Brown, Jacob Bonen-Clark; Foreword by Geert Kuiper
R4,197 Discovery Miles 41 970 Ships in 12 - 17 working days

This is the first study of Boko Haram that brings advanced data-driven, machine learning models to both learn models capable of predicting a wide range of attacks carried out by Boko Haram, as well as develop data-driven policies to shape Boko Haram's behavior and reduce attacks by them. This book also identifies conditions that predict sexual violence, suicide bombings and attempted bombings, abduction, arson, looting, and targeting of government officials and security installations. After reducing Boko Haram's history to a spreadsheet containing monthly information about different types of attacks and different circumstances prevailing over a 9 year period, this book introduces Temporal Probabilistic (TP) rules that can be automatically learned from data and are easy to explain to policy makers and security experts. This book additionally reports on over 1 year of forecasts made using the model in order to validate predictive accuracy. It also introduces a policy computation method to rein in Boko Haram's attacks. Applied machine learning researchers, machine learning experts and predictive modeling experts agree that this book is a valuable learning asset. Counter-terrorism experts, national and international security experts, public policy experts and Africa experts will also agree this book is a valuable learning tool.

Search Theory - A Game Theoretic Perspective (Hardcover, 2013 ed.): Steve Alpern, Robbert Fokkink, Leszek Gasieniec, Roy... Search Theory - A Game Theoretic Perspective (Hardcover, 2013 ed.)
Steve Alpern, Robbert Fokkink, Leszek Gasieniec, Roy Lindelauf, V.S. Subrahmanian
R4,580 R3,604 Discovery Miles 36 040 Save R976 (21%) Ships in 12 - 17 working days

Search games and rendezvous problems have received growing attention in computer science within the past few years. Rendezvous problems emerge naturally, for instance, to optimize performance and convergence of mobile robots. This gives a new algorithmic point of view to the theory. Furthermore, modern topics such as the spreading of gossip or disease in social networks have lead to new challenging problems in search and rendezvous.

"Search Theory: A Game Theoretic Perspective" introduces the first integrated approach to Search and Rendezvous from the perspectives ofbiologists, computer scientists and mathematicians. This contributed volume covers a wide range of topics including rendezvous problems and solutions, rendezvous on graphs, search games on biology, mobility in governed social networks, search and security, and more. Most chapters also include case studies or a survey, in addition to a chapter on the future direction of Search and Rendezvous research.

This book targets researchers and practitioners working in computer science, mathematics and biology as a reference book. Advanced level students focused on these fields will also find this book valuable as a secondary text book orreference."

Indian Mujahideen - Computational Analysis and Public Policy (Hardcover, 2013 ed.): V.S. Subrahmanian, Aaron Mannes, Animesh... Indian Mujahideen - Computational Analysis and Public Policy (Hardcover, 2013 ed.)
V.S. Subrahmanian, Aaron Mannes, Animesh Roul, R.K. Raghavan
R3,464 Discovery Miles 34 640 Ships in 12 - 17 working days

Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for international security analysts and policymakers. Uzi Arad, National Security Advisor to the Prime Minister of Israel and Head, Israel National Security Council (2009-2011) An important book on a complex security problem. Issues have been analysed in depth based on quality research. Insightful and well-balanced in describing the way forward. Naresh Chandra, Indian Ambassador to the USA (1996-2001) and Cabinet Secretary (1990-1992). An objective and clinical account of the origins, aims, extra-territorial links and modus-operandi, of a growingly dangerous terrorist organization that challenges the federal, democratic, secular and pluralistic ethos of India s polity. The authors have meticulously researched and analysed the multi-faceted challenges that the Indian Mujahideen poses and realistically dwelt on the ways in which these challenges could be faced and overcome. G. Parthasarathy, High Commissioner of India to Australia (1995-1998) and Pakistan (1998-2000). This book provides the first in-depth look at how advanced mathematics and modern computing technology can influence insights on analysis and policies directed at the Indian Mujahideen (IM) terrorist group. The book also summarizes how the IM group is committed to the destabilization of India by leveraging links with other terror groups such as Lashkar-e-Taiba, and through support from the Pakistani Government and Pakistan s intelligence service.

Foreword by The Hon. Louis J. Freeh."

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,492 Discovery Miles 34 920 Ships in 12 - 17 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

"Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems.

Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."

Handbook of Computational Approaches to Counterterrorism (Hardcover, 2013 ed.): V.S. Subrahmanian Handbook of Computational Approaches to Counterterrorism (Hardcover, 2013 ed.)
V.S. Subrahmanian
R3,121 Discovery Miles 31 210 Ships in 10 - 15 working days

Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their behaviour, and shaping policies about their behaviour. Handbook of Computational Approaches to Counterterrorism provides the first in-depth look at how advanced mathematics and modern computing technology is shaping the study of terrorist groups. This book includes contributions from world experts in the field, and presents extensive information on terrorism data sets, new ways of building such data sets in real-time using text analytics, introduces the mathematics and computational approaches to understand terror group behaviour, analyzes terror networks, forecasts terror group behaviour, and shapes policies against terrorist groups. Auxiliary information will be posted on the book's website. This book targets defence analysts, counter terror analysts, computer scientists, mathematicians, political scientists, psychologists, and researchers from the wide variety of fields engaged in counter-terrorism research. Advanced-level students in computer science, mathematics and social sciences will also find this book useful.

The Global Cyber-Vulnerability Report (Hardcover, 1st ed. 2015): V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, Aditya... The Global Cyber-Vulnerability Report (Hardcover, 1st ed. 2015)
V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, Aditya Prakash
R3,983 R3,600 Discovery Miles 36 000 Save R383 (10%) Ships in 12 - 17 working days

This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.

Detecting Trust and Deception in Group Interaction (Paperback, 1st ed. 2021): V.S. Subrahmanian, Judee K. Burgoon, Norah E.... Detecting Trust and Deception in Group Interaction (Paperback, 1st ed. 2021)
V.S. Subrahmanian, Judee K. Burgoon, Norah E. Dunbar
R2,984 Discovery Miles 29 840 Ships in 10 - 15 working days

This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game, based on the well-known Mafia and Resistance games, as well as selected other settings. This book develops statistical results linking different types of facial expressions (e.g. smile, pursed lips, raised eyebrows), vocal features (e.g., pitch, loudness) and linguistic features (e.g., dominant language, turn length) with both unary behaviors (e.g. is person X lying?) to binary behaviors (Is person X dominant compared to person Y? Does X trust Y? Does X like Y?). In addition, this book describes machine learning and computer vision-based algorithms that can be used to predict deception, as well as the visual focus of attention of people during discussions that can be linked to many binary behaviors. It is written by a multidisciplinary team of both social scientists and computer scientists. Meetings are at the very heart of human activity. Whether you are involved in a business meeting or in a diplomatic negotiation, such an event has multiple actors, some cooperative and some adversarial. Some actors may be deceptive, others may have complex relationships with others in the group. This book consists of a set of 11 chapters that describe the factors that link human behavior in group settings and attitudes to facial and voice characteristics. Researchers working in social sciences (communication, psychology, cognitive science) with an interest in studying the link between human interpersonal behavior and facial/speech/linguistic characteristics will be interested in this book. Computer scientists, who are interested in developing machine learning and deep learning based models of human behavior in group settings will also be interested in purchasing this book.

A Machine Learning Based Model of Boko Haram (Paperback, 1st ed. 2021): V.S. Subrahmanian, Chiara Pulice, James F. Brown, Jacob... A Machine Learning Based Model of Boko Haram (Paperback, 1st ed. 2021)
V.S. Subrahmanian, Chiara Pulice, James F. Brown, Jacob Bonen-Clark; Foreword by Geert Kuiper
R4,252 Discovery Miles 42 520 Ships in 10 - 15 working days

This is the first study of Boko Haram that brings advanced data-driven, machine learning models to both learn models capable of predicting a wide range of attacks carried out by Boko Haram, as well as develop data-driven policies to shape Boko Haram's behavior and reduce attacks by them. This book also identifies conditions that predict sexual violence, suicide bombings and attempted bombings, abduction, arson, looting, and targeting of government officials and security installations. After reducing Boko Haram's history to a spreadsheet containing monthly information about different types of attacks and different circumstances prevailing over a 9 year period, this book introduces Temporal Probabilistic (TP) rules that can be automatically learned from data and are easy to explain to policy makers and security experts. This book additionally reports on over 1 year of forecasts made using the model in order to validate predictive accuracy. It also introduces a policy computation method to rein in Boko Haram's attacks. Applied machine learning researchers, machine learning experts and predictive modeling experts agree that this book is a valuable learning asset. Counter-terrorism experts, national and international security experts, public policy experts and Africa experts will also agree this book is a valuable learning tool.

Adaptive Autonomous Secure Cyber Systems (Paperback, 1st ed. 2020): Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin... Adaptive Autonomous Secure Cyber Systems (Paperback, 1st ed. 2020)
Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R4,792 Discovery Miles 47 920 Ships in 10 - 15 working days

This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system. This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment. Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security. This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.

The Global Cyber-Vulnerability Report (Paperback, Softcover reprint of the original 1st ed. 2015): V.S. Subrahmanian, Michael... The Global Cyber-Vulnerability Report (Paperback, Softcover reprint of the original 1st ed. 2015)
V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, Aditya Prakash
R3,008 Discovery Miles 30 080 Ships in 10 - 15 working days

This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.

Cyber Deception - Building the Scientific Foundation (Paperback, Softcover reprint of the original 1st ed. 2016): Sushil... Cyber Deception - Building the Scientific Foundation (Paperback, Softcover reprint of the original 1st ed. 2016)
Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
R5,343 Discovery Miles 53 430 Ships in 10 - 15 working days

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.

Cyber Warfare - Building the Scientific Foundation (Paperback, Softcover reprint of the original 1st ed. 2015): Sushil Jajodia,... Cyber Warfare - Building the Scientific Foundation (Paperback, Softcover reprint of the original 1st ed. 2015)
Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
R4,765 Discovery Miles 47 650 Ships in 10 - 15 working days

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference.

Indian Mujahideen - Computational Analysis and Public Policy (Paperback, Softcover reprint of the original 1st ed. 2013): V.S.... Indian Mujahideen - Computational Analysis and Public Policy (Paperback, Softcover reprint of the original 1st ed. 2013)
V.S. Subrahmanian, Aaron Mannes, Animesh Roul, R.K. Raghavan
R3,517 Discovery Miles 35 170 Ships in 10 - 15 working days

Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy "This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for international security analysts and policymakers." Uzi Arad, National Security Advisor to the Prime Minister of Israel and Head, Israel National Security Council (2009-2011) "An important book on a complex security problem. Issues have been analysed in depth based on quality research. Insightful and well-balanced in describing the way forward." Naresh Chandra, Indian Ambassador to the USA (1996-2001) and Cabinet Secretary (1990-1992). "An objective and clinical account of the origins, aims, extra-territorial links and modus-operandi, of a growingly dangerous terrorist organization that challenges the federal, democratic, secular and pluralistic ethos of India's polity. The authors have meticulously researched and analysed the multi-faceted challenges that the "Indian Mujahideen" poses and realistically dwelt on the ways in which these challenges could be faced and overcome." G. Parthasarathy, High Commissioner of India to Australia (1995-1998) and Pakistan (1998-2000). This book provides the first in-depth look at how advanced mathematics and modern computing technology can influence insights on analysis and policies directed at the Indian Mujahideen (IM) terrorist group. The book also summarizes how the IM group is committed to the destabilization of India by leveraging links with other terror groups such as Lashkar-e-Taiba, and through support from the Pakistani Government and Pakistan's intelligence service. Foreword by The Hon. Louis J. Freeh.

Search Theory - A Game Theoretic Perspective (Paperback, 2013 ed.): Steve Alpern, Robbert Fokkink, Leszek Gasieniec, Roy... Search Theory - A Game Theoretic Perspective (Paperback, 2013 ed.)
Steve Alpern, Robbert Fokkink, Leszek Gasieniec, Roy Lindelauf, V.S. Subrahmanian
R3,914 Discovery Miles 39 140 Ships in 10 - 15 working days

Search games and rendezvous problems have received growing attention in computer science within the past few years. Rendezvous problems emerge naturally, for instance, to optimize performance and convergence of mobile robots. This gives a new algorithmic point of view to the theory. Furthermore, modern topics such as the spreading of gossip or disease in social networks have lead to new challenging problems in search and rendezvous. Search Theory: A Game Theoretic Perspective introduces the first integrated approach to Search and Rendezvous from the perspectives of biologists, computer scientists and mathematicians. This contributed volume covers a wide range of topics including rendezvous problems and solutions, rendezvous on graphs, search games on biology, mobility in governed social networks, search and security, and more. Most chapters also include case studies or a survey, in addition to a chapter on the future direction of Search and Rendezvous research. This book targets researchers and practitioners working in computer science, mathematics and biology as a reference book. Advanced level students focused on these fields will also find this book valuable as a secondary text book or reference.

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Paperback, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Paperback, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,617 Discovery Miles 36 170 Ships in 10 - 15 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In this second volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

Geospatial Abduction - Principles and Practice (Paperback, 2011 ed.): Paulo Shakarian, V.S. Subrahmanian Geospatial Abduction - Principles and Practice (Paperback, 2011 ed.)
Paulo Shakarian, V.S. Subrahmanian
R1,580 Discovery Miles 15 800 Ships in 10 - 15 working days

Imagine yourself as a military officer in a conflict zone trying to identify locations of weapons caches supporting road-side bomb attacks on your country's troops. Or imagine yourself as a public health expert trying to identify the location of contaminated water that is causing diarrheal diseases in a local population. Geospatial abduction is a new technique introduced by the authors that allows such problems to be solved. Geospatial Abduction provides the mathematics underlying geospatial abduction and the algorithms to solve them in practice; it has wide applicability and can be used by practitioners and researchers in many different fields. Real-world applications of geospatial abduction to military problems are included. Compelling examples drawn from other domains as diverse as criminology, epidemiology and archaeology are covered as well. This book also includes access to a dedicated website on geospatial abduction hosted by University of Maryland. Geospatial Abduction targets practitioners working in general AI, game theory, linear programming, data mining, machine learning, and more. Those working in the fields of computer science, mathematics, geoinformation, geological and biological science will also find this book valuable.

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba (Paperback): V.S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana... Computational Analysis of Terrorist Groups: Lashkar-e-Taiba (Paperback)
V.S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
R2,745 Discovery Miles 27 450 Ships in 10 - 15 working days

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates. After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is the first book that demonstrates how to use modern computational analysis techniques including methods for "big data" analysis. This book presents how to quantify both the environment in which LeT operate, and the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations. This book also provides a detailed history of Lashkar-e-Taiba based on extensive analysis conducted by using open source information and public statements. Each chapter includes a case study, as well as a slide describing the key results which are available on the authors' web sites. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is designed for a professional market composed of government or military workers, researchers and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book.

Data-driven Generation of Policies (Paperback, 2014): Austin Parker, Gerardo I. Simari, Amy Sliva, V.S. Subrahmanian Data-driven Generation of Policies (Paperback, 2014)
Austin Parker, Gerardo I. Simari, Amy Sliva, V.S. Subrahmanian
R1,710 Discovery Miles 17 100 Ships in 10 - 15 working days

This Springer Brief presents a basic algorithm that provides a correct solution to finding an optimal state change attempt, as well as an enhanced algorithm that is built on top of the well-known trie data structure. It explores correctness and algorithmic complexity results for both algorithms and experiments comparing their performance on both real-world and synthetic data. Topics addressed include optimal state change attempts, state change effectiveness, different kind of effect estimators, planning under uncertainty and experimental evaluation. These topics will help researchers analyze tabular data, even if the data contains states (of the world) and events (taken by an agent) whose effects are not well understood. Event DBs are omnipresent in the social sciences and may include diverse scenarios from political events and the state of a country to education-related actions and their effects on a school system. With a wide range of applications in computer science and the social sciences, the information in this Springer Brief is valuable for professionals and researchers dealing with tabular data, artificial intelligence and data mining. The applications are also useful for advanced-level students of computer science.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Lied Vir Sarah - Lesse Van My Ma
Jonathan Jansen, Naomi Jansen Hardcover  (1)
R90 R71 Discovery Miles 710
State Voting Laws in America: Historical…
M. Smith, K. Anderson, … Hardcover R1,542 Discovery Miles 15 420
Frans Barker's The South African labour…
D. Yu, P Roos Paperback R805 R737 Discovery Miles 7 370
UnHealthcare - A Manifesto for Health…
Hemant Taneja, Stephen Klasko Hardcover R688 Discovery Miles 6 880
Law Of Evidence
A Bellengere, C. Theophilopoulos, … Paperback  (2)
R701 R648 Discovery Miles 6 480
Thoughts on the Future Civil Policy of…
John William Draper Paperback R533 Discovery Miles 5 330
Glossy - The Inside Story Of Vogue
Nina-Sophia Miralles Paperback R402 R327 Discovery Miles 3 270
Autopsy - Life in the trenches with a…
Ryan Blumenthal Paperback R317 R260 Discovery Miles 2 600
The Sociology of a New York City Block
Thomas Jesse Jones Paperback R405 Discovery Miles 4 050
Adjudicating Revolution - Courts and…
Richard S. Kay, Joel I. Colon-Rios Hardcover R2,924 Discovery Miles 29 240

 

Partners