Game theory and machine learning for cyber security /
edited by Charles A. Kamhoua, Christopher D. Kiekintveld, Fei Fang, Quanyan Zhu.
- 1 online resource : illustrations (chiefly color)
Includes bibliographical references and index.
Introduction to game theory / Fei Fang, Shutian Liu, Anjon Basak, Quanyan Zhu, Christopher Kiekintveld, Charles A. Kamhoua -- Scalable algorithms for identifying stealthy attackers in a game theoretic framework using deception / Anjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld -- Honeypot allocation game over attack graphs for cyber deception / Ahmed H. Anwar, Charles Kamhoua, Nandi Leslie, Christopher Kiekintveld.
"Cyber security is a serious concern to our economic prosperity and national security. Despite an increased investment in cyber defense, cyber-attackers are becoming more creative and sophisticated. This exposes the need for a more rigorous approach to cyber security, including methods from artificial intelligence including computational game theory and machine learning. Recent advances in adversarial machine learning are promising to make artificial intelligence (AI) algorithms more robust to deception and intelligent manipulation. However, they are still vulnerable to adversarial inputs, data poisoning, model stealing and evasion attacks. The above challenges and the high risk and consequence of cyber-attacks drive the need to accelerate basic research on cyber security"--
1119723949 9781119723912 1119723914 9781119723950 1119723957 9781119723943
10.1002/9781119723950 doi
9536219 IEEE
2021031985
Computer networks--Security measures.
Game theory.
Machine learning.
Computer networks--Security measures.
Game theory.
Machine learning.
Electronic books.
TK5105.59 / .G353 2021
658.4/78
Includes bibliographical references and index.
Introduction to game theory / Fei Fang, Shutian Liu, Anjon Basak, Quanyan Zhu, Christopher Kiekintveld, Charles A. Kamhoua -- Scalable algorithms for identifying stealthy attackers in a game theoretic framework using deception / Anjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld -- Honeypot allocation game over attack graphs for cyber deception / Ahmed H. Anwar, Charles Kamhoua, Nandi Leslie, Christopher Kiekintveld.
"Cyber security is a serious concern to our economic prosperity and national security. Despite an increased investment in cyber defense, cyber-attackers are becoming more creative and sophisticated. This exposes the need for a more rigorous approach to cyber security, including methods from artificial intelligence including computational game theory and machine learning. Recent advances in adversarial machine learning are promising to make artificial intelligence (AI) algorithms more robust to deception and intelligent manipulation. However, they are still vulnerable to adversarial inputs, data poisoning, model stealing and evasion attacks. The above challenges and the high risk and consequence of cyber-attacks drive the need to accelerate basic research on cyber security"--
1119723949 9781119723912 1119723914 9781119723950 1119723957 9781119723943
10.1002/9781119723950 doi
9536219 IEEE
2021031985
Computer networks--Security measures.
Game theory.
Machine learning.
Computer networks--Security measures.
Game theory.
Machine learning.
Electronic books.
TK5105.59 / .G353 2021
658.4/78