logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Game Theory and Machine Learning for Cyber Security by Charles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor) ISBN 9781119723929, 1119723922

  • SKU: EBN-34495194
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.4

19 reviews
Instant download (eBook) Game Theory and Machine Learning for Cyber Security after payment.
Authors:Charles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor)
Pages:576 pages.
Year:2021
Editon:1
Publisher:Wiley-IEEE Press
Language:english
File Size:13.53 MB
Format:pdf
ISBNS:9781119723929, 1119723922
Categories: Ebooks

Product desciption

(Ebook) Game Theory and Machine Learning for Cyber Security by Charles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor) ISBN 9781119723929, 1119723922

<p><b>Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field </b></p> <p>In <i>Game Theory and Machine Learning for Cyber Security</i>, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security. </p> <p>Readers will explore the vulnerabilities of traditional machine learning algorithms and how they can be mitigated in an adversarial machine learning approach. The book offers a comprehensive suite of solutions to a broad range of technical issues in applying game theory and machine learning to solve cyber security challenges. </p> <p>Beginning with an introduction to foundational concepts in game theory, machine learning, cyber security, and cyber deception, the editors provide readers with resources that discuss the latest in hypergames, behavioral game theory, adversarial machine learning, generative adversarial networks, and multi-agent reinforcement learning. </p> <p>Readers will also enjoy: </p> <ul><li>A thorough introduction to game theory for cyber deception, including scalable algorithms for identifying stealthy attackers in a game theoretic framework, honeypot allocation over attack graphs, and behavioral games for cyber deception </li> <li>An exploration of game theory for cyber security, including actionable game-theoretic adversarial intervention detection against persistent and advanced threats </li> <li>Practical discussions of adversarial machine learning for cyber security, including adversarial machine learning in 5G security and machine learning-driven fault injection in cyber-physical systems </li> <li>In-depth examinations of generative models for cyber security  </li> </ul><p>Perfect for researchers, students, and experts in the fields of computer science and engineering, <i>Game Theory and Machine Learning for Cyber Security </i>is also an indispensable resource for industry professionals, military personnel, researchers, faculty, and students with an interest in cyber security. </p>
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products