Please take a moment to complete this survey below

Library's collection Library's IT development Cancel

Advances in human factors in robots and unmanned systems : Proceedings of the AHFE 2017 international conference on human factors in robots and unmanned systems, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA 1st ed.

Author
Additional Author(s)
  • Lehto, Martti
  • Neittaanmäki, Pekka
Publisher
Cham, Switzerland : Springer International Publishing, 2018
Language
English
ISBN
9783319603841
Series
Advances in intelligent systems and computing 595
Subject(s)
  • PSYCHOLOGY, EXPERIMENTAL
  • ROBOTICS
  • USER INTERFACES (COMPUTER SYSTEMS)
Notes
. .
Abstract
This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others.
Physical Dimension
Number of Page(s)
1 online resource (viii, 288 p.)
Dimension
-
Other Desc.
ill.
Summary / Review / Table of Content
I Cyber Power --
1 Developing Political Response Framework to Cyber Hostilities --
2 The modern strategies in the cyber warfare --
3 Cyber Security Strategy Implementation Architecture in a Value System --
4 Jedis and Starmen - Cyber in the Service of the Light Side of the Force --
5 Junk information in hybrid warfare – The rhizomatic speed of social media in the spamosphere --
II Cyber in the Service of the Light Side of the Force --
6 Real-time application-layer DDoS attacks detection in encrypted traffic --
7 Domain Generation Algorithms (DGA) detection using machine learning methods --
8 Tailorable Representation of Security Control Catalog on Semantic Wiki --
9 Password Cracking --
10 Game Console attacking --
11 OS Attacks --
12 Honeypot utilization for network intrusion detection --
13 Testing framework for intrusion detection systems in encrypted traffic --
14 Security Challenges of IoT-based Smart Home Appliances.
Exemplar(s)
# Accession No. Call Number Location Status
1.01163/20006.3 AdvOnline !Available

Similar Collection

by author or subject