Télécharger le livre :  Cyber Deception

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in...
Editeur : Springer
Parution : 2016-07-15

Format(s) : PDF, ePub
168,79

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Global Cyber-Vulnerability Report

This is the first book  that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation...
Editeur : Springer
Parution : 2015-12-09
Collection : Terrorism, Security, and Computation
Format(s) : PDF, ePub
94,94

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Data-driven Generation of Policies

This Springer Brief presents a basic algorithm that provides a correct solution to finding an optimal state change attempt, as well as an enhanced algorithm that is built on top of the well-known trie data structure. It explores correctness and algorithmic complexity...
Editeur : Springer
Parution : 2014-01-04
Collection : SpringerBriefs in Computer Science
Format(s) : ePub
52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Indian Mujahideen

Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy “This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for...
Editeur : Springer
Parution : 2013-11-09
Collection : Terrorism, Security, and Computation
Format(s) : ePub
94,94

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Handbook of Computational Approaches to Counterterrorism

Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their...
Editeur : Springer
Parution : 2012-12-12

Format(s) : ePub
94,94

Téléchargement immédiat
Dès validation de votre commande