Nature-Inspired Cyber Security and Resiliency : Fundamentals, Techniques and Applications /

The rapid evolution of cyberspace, computing, and communications has given rise to numerous new applications, services, and business opportunities. Over the past decade, several advancements of potentially significant benefits have emerged, such as fog and cloud computing, smart infrastructure syste...

Full description

Bibliographic Details
Other Authors: El-Alfy, El Sayed M., 1968- (Editor), El-Alfy, El-Sayed M. (ed), Eltoweissy, Mohamed (ed, Editor), Fulp, Errin W. (ed, Editor), Mazurczyk, Wojciech (ed, Editor)
Format: Book
Language:English
Published: Stevenage : IET, 2019
Stevenage : 2019
Series:Security
Subjects:
LEADER 05593nam a22006133i 4500
001 5a77465f-3422-4d6b-9de6-74aaf8ed5d70
005 20240811000000.0
008 190429s2019 enk| fo| 00| 0|eng d
020 |a 9781785616396 
035 |a (UkSgIET)IETBPBSE010E 
035 |a (UkSgIET)PBSE010E 
040 |a UkSgIET  |b eng  |c UkSgIET 
040 |a UkSgIET  |b eng  |e rda  |c UkSgIET 
072 7 |a C0000  |2 inspec 
072 7 |a C0310S  |2 inspec 
072 7 |a C6130S  |2 inspec 
245 0 0 |a Nature-Inspired Cyber Security and Resiliency :  |b Fundamentals, Techniques and Applications /  |c  El-Sayed M. El-Alfy; Mohamed Eltoweissy; Errin W. Fulp; Wojciech Mazurczyk [Eds] 
260 |a Stevenage :  |b IET,  |c 2019 
264 1 |a Stevenage :  |b IET,  |c 2019 
300 |a 1 online resource (458 p.) 
300 |a 1 online resource (458 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rdaft 
490 1 |a Security 
506 |a Restricted for use by site license 
520 |a The rapid evolution of cyberspace, computing, and communications has given rise to numerous new applications, services, and business opportunities. Over the past decade, several advancements of potentially significant benefits have emerged, such as fog and cloud computing, smart infrastructure systems and environments, Internet of Things (IoT), collaborative computing, virtual and mixed reality environments, et cetera These systems are often characterized as complex, highly dynamic, and distributed. As a result, they require efficient, robust, distributed, and cooperative monitoring, measurement, control, and management for communication and data processing. As organizations and individuals rely more on these systems, it has become substantially crucial to maintain their security, trustworthiness, and resilience to attacks. These issues raise new design and operational challenges that require innovative and creative sustainable solutions for cyber security and resilience.The aim of the book is to provide a timely review of the essential fundamentals, latest developments, and diverse applications of nature-inspired algorithms in cyber security and resilience. The book targets IT professionals, engineers, software developers and academic educators, graduate students and postdocs in the field of computing and cyber security. It also targets scientists, engineers, and professionals in other related disciplines who are interested in exploring nature-inspired applications in cyber security 
520 |a The rapid evolution of cyberspace, computing, and communications has given rise to numerous new applications, services, and business opportunities. Over the past decade, several advancements of potentially significant benefits have emerged, such as fog and cloud computing, smart infrastructure systems and environments, Internet of Things (IoT), collaborative computing, virtual and mixed reality environments, etc. These systems are often characterized as complex, highly dynamic, and distributed. As a result, they require efficient, robust, distributed, and cooperative monitoring, measurement, control, and management for communication and data processing. As organizations and individuals rely more on these systems, it has become substantially crucial to maintain their security, trustworthiness, and resilience to attacks. These issues raise new design and operational challenges that require innovative and creative sustainable solutions for cyber security and resilience.The aim of the book is to provide a timely review of the essential fundamentals, latest developments, and diverse applications of nature-inspired algorithms in cyber security and resilience. The book targets IT professionals, engineers, software developers and academic educators, graduate students and postdocs in the field of computing and cyber security. It also targets scientists, engineers, and professionals in other related disciplines who are interested in exploring nature-inspired applications in cyber security 
650 0 |a Biomimetics 
650 0 |a Computer security 
650 7 |a Biomimetics  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a biomimetics  |2 inspect 
650 7 |a fault tolerant computing  |2 inspect 
650 7 |a security of data  |2 inspect 
650 7 |a trusted computing  |2 inspect 
653 |a cyber security 
653 |a data processing 
653 |a distributed cooperative monitoring 
653 |a nature-inspired algorithms 
653 |a resilience to attacks 
653 |a trustworthiness 
700 1 |a El-Alfy, El Sayed M.,  |d 1968-  |e editor 
700 1 |a El-Alfy, El-Sayed M.,  |e ed 
700 1 |a Eltoweissy, Mohamed,  |e ed  |1 http://viaf.org/viaf/20156495373517561133 
700 1 |a Eltoweissy, Mohamed,  |e editor 
700 1 |a Fulp, Errin W.,  |e ed  |1 http://viaf.org/viaf/25156495373617561146 
700 1 |a Fulp, Errin W.,  |e editor 
700 1 |a Mazurczyk, Wojciech,  |e ed  |1 http://viaf.org/viaf/115146153032105250130 
700 1 |a Mazurczyk, Wojciech,  |e editor 
830 0 |a Security 
999 1 0 |i 5a77465f-3422-4d6b-9de6-74aaf8ed5d70  |l 12576030  |s US-ICU  |m nature_inspired_cyber_security_and_resiliencyfundamentals_techniques_a_____2019_______iet__a___________________________________________________________________________e 
999 1 0 |i 5a77465f-3422-4d6b-9de6-74aaf8ed5d70  |l 9977924789103681  |s US-PU  |m nature_inspired_cyber_security_and_resiliencyfundamentals_techniques_a_____2019_______iet__a___________________________________________________________________________e