Intelligent methods for cyber warfare:
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
2015
|
Schriftenreihe: | Studies in computational intelligence
563 |
Schlagworte: | |
Online-Zugang: | BHS01 BTU01 FAB01 FAW01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9783319086248 |
DOI: | 10.1007/978-3-319-08624-8 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV042167190 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 141104s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319086248 |c Online |9 978-3-319-08624-8 | ||
024 | 7 | |a 10.1007/978-3-319-08624-8 |2 doi | |
035 | |a (OCoLC)892074260 | ||
035 | |a (DE-599)BSZ416043577 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-634 |a DE-Aug4 |a DE-1043 |a DE-1046 |a DE-859 |a DE-92 |a DE-898 |a DE-863 |a DE-862 |a DE-573 |a DE-B768 |a DE-861 | ||
050 | 0 | |a Q342 | |
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
084 | |a UYQ |2 sdnb | ||
084 | |a COM004000 |2 sdnb | ||
245 | 1 | 0 | |a Intelligent methods for cyber warfare |c Ronald R. Yager ..., eds. |
264 | 1 | |a Cham [u.a.] |b Springer |c 2015 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Studies in computational intelligence |v 563 | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Engineering | |
700 | 1 | |a Yager, Ronald R. |d 1941- |0 (DE-588)139994378 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-08623-1 |
830 | 0 | |a Studies in computational intelligence |v 563 |w (DE-604)BV020822171 |9 563 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-08624-8 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027606705&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027606705&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027606705 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-08624-8 |l BHS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08624-8 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08624-8 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08624-8 |l FAW01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08624-8 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08624-8 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08624-8 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08624-8 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08624-8 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08624-8 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08624-8 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-08624-8 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 541507 |
---|---|
_version_ | 1806179182716125184 |
adam_text | INTELLIGENT METHODS FOR CYBER WARFARE
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
MALWARE AND MACHINE LEARNING
SOFT COMPUTING BASED EPIDEMICAL CRISIS PREDICTION
AN ACP-BASED APPROACH TO INTELLIGENCE AND SECURITY INFORMATICS
MICROFILES AS A POTENTIAL SOURCE OF CONFIDENTIAL INFORMATION LEAKAGE
DECISION SUPPORT IN OPEN SOURCE INTELLIGENCE
INFORMATION FUSION PROCESS DESIGN ISSUES FOR HARD AND SOFT INFORMATION:
DEVELOPING AN INITIAL PROTOTYPE
INTRUSION DETECTION WITH TYPE-2 FUZZY ONTOLOGIES AND SIMILARITY MEASURES
A MULTI-OBJECTIVE GENETIC ALGORITHM BASED APPROACH FOR EFFECTIVE
INTRUSION DETECTION USING NEURAL NETWORKS
CYBER INSIDER MISSION DETECTION FOR SITUATION AWARENESS
A GAME THEORETIC ENGINE FOR CYBER WARFARE
MISSION IMPACT ASSESSMENT FOR CYBER WARFARE
UNCERTAINTY MODELING: THE COMPUTATIONAL ECONOMISTS’ VIEW ON
CYBERWARFARE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
INTELLIGENT METHODS FOR CYBER WARFARE
/
: 2015
ABSTRACT / INHALTSTEXT
CYBERWARFARE HAS BECOME AN IMPORTANT CONCERN FOR GOVERNMENTAL AGENCIES
AS WELL BUSINESSES OF VARIOUS TYPES. THIS TIMELY VOLUME, WITH
CONTRIBUTIONS FROM SOME OF THE INTERNATIONALLY RECOGNIZED, LEADERS IN
THE FIELD, GIVES READERS A GLIMPSE OF THE NEW AND EMERGING WAYS THAT
COMPUTATIONAL INTELLIGENCE AND MACHINE LEARNING METHODS CAN BE APPLIED
TO ADDRESS PROBLEMS RELATED TO CYBERWARFARE. THE BOOK INCLUDES A NUMBER
OF CHAPTERS THAT CAN BE CONCEPTUALLY DIVIDED INTO THREE TOPICS: CHAPTERS
DESCRIBING DIFFERENT DATA ANALYSIS METHODOLOGIES WITH THEIR APPLICATIONS
TO CYBERWARFARE, CHAPTERS PRESENTING A NUMBER OF INTRUSION DETECTION
APPROACHES, AND CHAPTERS DEDICATED TO ANALYSIS OF POSSIBLE CYBER ATTACKS
AND THEIR IMPACT. THE BOOK PROVIDES THE READERS WITH A VARIETY OF
METHODS AND TECHNIQUES, BASED ON COMPUTATIONAL INTELLIGENCE, WHICH CAN
BE APPLIED TO THE BROAD DOMAIN OF CYBERWARFARE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Yager, Ronald R. 1941- |
author2_role | edt |
author2_variant | r r y rr rry |
author_GND | (DE-588)139994378 |
author_facet | Yager, Ronald R. 1941- |
building | Verbundindex |
bvnumber | BV042167190 |
callnumber-first | Q - Science |
callnumber-label | Q342 |
callnumber-raw | Q342 |
callnumber-search | Q342 |
callnumber-sort | Q 3342 |
callnumber-subject | Q - General Science |
classification_rvk | ST 300 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)892074260 (DE-599)BSZ416043577 |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-08624-8 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03098nmm a2200589 cb4500</leader><controlfield tag="001">BV042167190</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">141104s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319086248</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-08624-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-08624-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)892074260</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ416043577</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-B768</subfield><subfield code="a">DE-861</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">Q342</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">UYQ</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">COM004000</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligent methods for cyber warfare</subfield><subfield code="c">Ronald R. Yager ..., eds.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">563</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yager, Ronald R.</subfield><subfield code="d">1941-</subfield><subfield code="0">(DE-588)139994378</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-08623-1</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">563</subfield><subfield code="w">(DE-604)BV020822171</subfield><subfield code="9">563</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-08624-8</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027606705&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027606705&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027606705</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08624-8</subfield><subfield code="l">BHS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08624-8</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08624-8</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08624-8</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08624-8</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08624-8</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08624-8</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08624-8</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08624-8</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08624-8</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08624-8</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-08624-8</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042167190 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:04:56Z |
institution | BVB |
isbn | 9783319086248 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027606705 |
oclc_num | 892074260 |
open_access_boolean | |
owner | DE-634 DE-Aug4 DE-1043 DE-1046 DE-859 DE-92 DE-898 DE-BY-UBR DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-573 DE-B768 DE-861 |
owner_facet | DE-634 DE-Aug4 DE-1043 DE-1046 DE-859 DE-92 DE-898 DE-BY-UBR DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-573 DE-B768 DE-861 |
physical | 1 Online-Ressource |
psigel | ZDB-2-ENG |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Studies in computational intelligence |
series2 | Studies in computational intelligence |
spellingShingle | Intelligent methods for cyber warfare Studies in computational intelligence Ingenieurwissenschaften Künstliche Intelligenz Artificial intelligence Engineering |
title | Intelligent methods for cyber warfare |
title_auth | Intelligent methods for cyber warfare |
title_exact_search | Intelligent methods for cyber warfare |
title_full | Intelligent methods for cyber warfare Ronald R. Yager ..., eds. |
title_fullStr | Intelligent methods for cyber warfare Ronald R. Yager ..., eds. |
title_full_unstemmed | Intelligent methods for cyber warfare Ronald R. Yager ..., eds. |
title_short | Intelligent methods for cyber warfare |
title_sort | intelligent methods for cyber warfare |
topic | Ingenieurwissenschaften Künstliche Intelligenz Artificial intelligence Engineering |
topic_facet | Ingenieurwissenschaften Künstliche Intelligenz Artificial intelligence Engineering |
url | https://doi.org/10.1007/978-3-319-08624-8 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027606705&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027606705&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV020822171 |
work_keys_str_mv | AT yagerronaldr intelligentmethodsforcyberwarfare |