語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Detection and Analysis of Cyber Atta...
~
Templeton, Steven John.
Detection and Analysis of Cyber Attacks Using Bio-based Concepts.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Detection and Analysis of Cyber Attacks Using Bio-based Concepts./
作者:
Templeton, Steven John.
面頁冊數:
1 online resource (296 pages)
附註:
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: B.
標題:
Computer science. -
電子資源:
click for full text (PQDT)
ISBN:
9780355969597
Detection and Analysis of Cyber Attacks Using Bio-based Concepts.
Templeton, Steven John.
Detection and Analysis of Cyber Attacks Using Bio-based Concepts.
- 1 online resource (296 pages)
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: B.
Thesis (Ph.D.)--University of California, Davis, 2018.
Includes bibliographical references
The continuing increase in scale and complexity of computer systems challenges our ability to defend them against attack. Given the importance of computing to modern society, the need for robust, secure systems is paramount. Unfortunately, traditional methods of defense are inefficient, easily defeated, and do not scale well. In contrast, nature has found many robust and efficient solutions to complex problems of survival. These contain the building blocks to inspire new ideas to create efficient, survivable computer systems. This work examines several questions regarding:
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355969597Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
Detection and Analysis of Cyber Attacks Using Bio-based Concepts.
LDR
:03126ntm a2200397K 4500
001
914762
005
20180724121430.5
006
m o u
007
cr mn||||a|a||
008
190606s2018 xx obm 000 0 eng d
020
$a
9780355969597
035
$a
(MiAaPQ)AAI10742830
035
$a
(MiAaPQ)ucdavis:17662
035
$a
AAI10742830
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Templeton, Steven John.
$3
1188102
245
1 0
$a
Detection and Analysis of Cyber Attacks Using Bio-based Concepts.
264
0
$c
2018
300
$a
1 online resource (296 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: B.
500
$a
Includes supplementary digital materials.
500
$a
Adviser: Karl N. Levitt.
502
$a
Thesis (Ph.D.)--University of California, Davis, 2018.
504
$a
Includes bibliographical references
520
$a
The continuing increase in scale and complexity of computer systems challenges our ability to defend them against attack. Given the importance of computing to modern society, the need for robust, secure systems is paramount. Unfortunately, traditional methods of defense are inefficient, easily defeated, and do not scale well. In contrast, nature has found many robust and efficient solutions to complex problems of survival. These contain the building blocks to inspire new ideas to create efficient, survivable computer systems. This work examines several questions regarding:
520
$a
- requirements for effective security, in terms of performance and efficiency;
520
$a
- how differences between creatures in nature and their digital analogs affect the effectiveness of the bio-inspired system;
520
$a
- the fundamental ideas that allow development of effective bio-inspired systems;
520
$a
- techniques taken from biology useful in studying computer systems.
520
$a
One class of creatures known for their efficiency are the eusocial insects. Termites, bees and ants are examples. From these creatures' simple methods of communication emerge complex behaviors. Our system, "Antspace", uses a decentralized network of autonomous agents (Ants) as a framework for studying how variations in behavior affect the effectiveness of monitoring collections of computers. One finding was that mimicking nature was not as effective as tailoring the behavior to the digital environment. Understanding the underlying differences between the natural world and computer systems enables improvement in design of monitoring systems, and supports developing fundamental concepts for mapping bio-inspired systems onto computers. This dissertation builds on these and other biologically-inspired ideas related to ecology, mimicry and systematics to develop improvements in security.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
650
4
$a
Artificial intelligence.
$3
559380
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
690
$a
0800
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
University of California, Davis.
$b
Computer Science.
$3
1182372
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10742830
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入