Game theory and machine learning for cyber security /

"Cyber security is a serious concern to our economic prosperity and national security. Despite an increased investment in cyber defense, cyber-attackers are becoming more creative and sophisticated. This exposes the need for a more rigorous approach to cyber security, including methods from art...

Full description

Saved in:
Bibliographic Details
Corporate Authors: Wiley Online Library (Online service)
Group Author: Kamhoua, Charles A.; Kiekintveld, Christopher D.; Fang, Fei, 1989-; Zhu, Quanyan
Published: John Wiley & Sons, Inc.,
Publisher Address: Hoboken, New Jersey :
Publication Dates: [2021]
Literature type: eBook
Language: English
Subjects:
Online Access: https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950
Summary: "Cyber security is a serious concern to our economic prosperity and national security. Despite an increased investment in cyber defense, cyber-attackers are becoming more creative and sophisticated. This exposes the need for a more rigorous approach to cyber security, including methods from artificial intelligence including computational game theory and machine learning. Recent advances in adversarial machine learning are promising to make artificial intelligence (AI) algorithms more robust to deception and intelligent manipulation. However, they are still vulnerable to adversarial inputs, data poisoning, model stealing and evasion attacks. The above challenges and the high risk and consequence of cyber-attacks drive the need to accelerate basic research on cyber security"--
Item Description: Description based on print version record.
Carrier Form: 1 online resource (544 pages)
Also available in print.
Bibliography: Includes bibliographical references and index.
ISBN: 9781119723950 (electronic book)
9781119723929
9781119723912
9781119723943
Index Number: TK5105
CLC: TP393.08
Contents: Introduction to game theory / Fei Fang, Shutian Liu, Anjon Basak, Quanyan Zhu, Christopher Kiekintveld, Charles A. Kamhoua -- Scalable algorithms for identifying stealthy attackers in a game theoretic framework using deception / Anjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld -- Honeypot allocation game over attack graphs for cyber deception / Ahmed H. Anwar, Charles Kamhoua, Nandi Leslie, Christopher Kiekintveld.