Narrow your search

Library

KU Leuven (15)

Odisee (15)

Thomas More Kempen (15)

Thomas More Mechelen (15)

UCLL (15)

VIVES (15)

ULB (14)

ULiège (14)

UGent (5)

KBC (1)

More...

Resource type

book (15)


Language

English (15)


Year
From To Submit

2021 (2)

2020 (1)

2016 (1)

2015 (2)

2014 (1)

More...
Listing 1 - 10 of 15 << page
of 2
>>
Sort by

Book
Computational analysis of terrorist groups : Lashkar-e-Taiba
Author:
ISBN: 1461447682 1489992634 9786613936912 1461447690 128362446X Year: 2013 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses  on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and  how it operates. After 10 years of counter Al Qaeda operations,  LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda. Computational Analysis of  Terrorist Groups: Lashkar-e-Taiba is the first book that demonstrates how to use modern computational analysis techniques including methods for “big data” analysis.  This book presents how to quantify both the environment in which LeT operate, and  the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations. This book also provides a detailed  history of  Lashkar-e-Taiba based on extensive analysis conducted by  using open source information and public statements. Each chapter includes a case study, as well as  a slide describing the key results which are available on the authors’ web sites. Computational Analysis of  Terrorist Groups: Lashkar-e-Taiba is designed for a professional market composed of  government or military workers, researchers  and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book.

Keywords

Internet and terrorism. --- World Wide Web. --- Engineering & Applied Sciences --- Computer Science --- Computational intelligence. --- Data mining. --- Terrorism --- Jamat al-Dawa Pakistan. --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Intelligence, Computational --- Jamat al-Dava Pakistan --- Lashkar-e-Taiba --- Lashkar-yi Tayyabah --- LeT --- Jamāʻatuddaʻvah Pākistān --- Lashkar-e-Tayyiba --- Lashkar-e-Tayyaba --- Jamaat-ud-Dawa Pakistan --- Jamaʻat-ud-Daʻawa Pākistān --- Falāḥ-i Insāniyat Fāʼunḍeshan --- Falah-e- Insaniat Foundation --- FIF --- FEF --- Computer science. --- Mathematical logic. --- Computers. --- Artificial intelligence. --- Application software. --- Computer Science. --- Information Systems and Communication Service. --- Artificial Intelligence (incl. Robotics). --- Data Mining and Knowledge Discovery. --- Computer Appl. in Social and Behavioral Sciences. --- Mathematical Logic and Formal Languages. --- Database searching --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Artificial intelligence --- Soft computing --- Information systems. --- Social sciences --- Artificial Intelligence. --- Data processing. --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Calculators --- Cyberspace


Book
Handbook of computational approaches to counterterrorism
Author:
ISBN: 1461453100 1461453119 1283934027 1489987665 Year: 2013 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their behaviour, and shaping policies about their behaviour. Handbook of Computational Approaches to Counterterrorism provides the first in-depth look at how advanced mathematics and modern computing technology is shaping the study of terrorist groups. This book includes contributions from world experts in the field, and presents extensive information on terrorism data sets, new ways of building such data sets in real-time using text analytics, introduces the mathematics and computational approaches to understand terror group behaviour, analyzes terror networks, forecasts terror group behaviour, and shapes policies against terrorist groups. Auxiliary information will be posted on the book’s website. This book targets defence analysts, counter terror analysts, computer scientists, mathematicians, political scientists, psychologists, and researchers from the wide variety of fields engaged in counter-terrorism research. Advanced-level students in computer science, mathematics and social sciences will also find this book useful.

Keywords

Information Technology --- Artificial Intelligence --- Terrorism -- Prevention. --- Terrorism. --- Terrorism --- Mechanical Engineering --- Engineering & Applied Sciences --- Social Welfare & Social Work --- Social Sciences --- Computer Science --- Mechanical Engineering - General --- Criminology, Penology & Juvenile Delinquency --- Prevention --- Data processing --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Computer science. --- Mathematical statistics. --- Data mining. --- Artificial intelligence. --- Application software. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Probability and Statistics in Computer Science. --- Data Mining and Knowledge Discovery. --- Criminology and Criminal Justice, general. --- Computer Appl. in Social and Behavioral Sciences. --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Criminology. --- Social sciences --- Artificial Intelligence. --- Data processing. --- Crime --- Criminals --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Study and teaching --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Mathematics --- Statistical inference --- Statistics, Mathematical --- Statistics --- Probabilities --- Sampling (Statistics) --- Statistical methods


Book
A machine learning based model of Boko Haram
Authors: ---
ISBN: 3030606147 3030606139 Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the first study of Boko Haram that brings advanced data-driven, machine learning models to both learn models capable of predicting a wide range of attacks carried out by Boko Haram, as well as develop data-driven policies to shape Boko Haram’s behavior and reduce attacks by them. This book also identifies conditions that predict sexual violence, suicide bombings and attempted bombings, abduction, arson, looting, and targeting of government officials and security installations. After reducing Boko Haram’s history to a spreadsheet containing monthly information about different types of attacks and different circumstances prevailing over a 9 year period, this book introduces Temporal Probabilistic (TP) rules that can be automatically learned from data and are easy to explain to policy makers and security experts. This book additionally reports on over 1 year of forecasts made using the model in order to validate predictive accuracy. It also introduces a policy computation method to rein in Boko Haram’s attacks. Applied machine learning researchers, machine learning experts and predictive modeling experts agree that this book is a valuable learning asset. Counter-terrorism experts, national and international security experts, public policy experts and Africa experts will also agree this book is a valuable learning tool.

Keywords

Machine learning. --- Data mining. --- Terrorism. --- Political violence. --- Machine Learning. --- Data Mining and Knowledge Discovery. --- Terrorism and Political Violence. --- Violence --- Political crimes and offenses --- Terrorism --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Direct action --- Insurgency --- Subversive activities --- Political violence --- Terror --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Learning, Machine --- Artificial intelligence --- Machine theory --- Forecasting. --- Prevention. --- Boko Haram. --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism --- BH (Boko Haram) --- Boko Harram --- Jamāʻat Ahl al-Sunnah li-Daʻwah wa-l-Jihād --- Jamāʻat Ahl al-Sunnah lil-Daʻwatihi wa-al-Jihād --- Jamāʻat Ahl as-Sunnah lid-Daʻwah wa-l-Jihād --- Jamaat Ahlussunah lid-Dawa wal-Jihad --- Jamaʼatu Ahlis Sunna Liddaʼawati Wal-Jihad --- Jama'atu Ahlisunnah Lida'awati wal-Jihad --- Jamaʼatul Alhul Sunnah Liddaʼwati wal jihad --- Jamatu Ahlis Sunna Lidawatti wal Jihad --- JAS (Jama'atu Ahlisunnah Lida'awati wal-Jihad) --- Nigerian Taliban --- People Committed to the Propagation of the Prophet's Teachings and Jihad --- Yusufiya --- جماعة اهل السنة للدعوة والجهاد --- Islamic State in West Africa Province --- Ansaru


Book
Scalable Uncertainty Management : 7th International Conference, SUM 2013, Washington, DC, USA, September 16-18, 2013, Proceedings
Authors: --- ---
ISBN: 3642403808 3642403816 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 7th International Conference on Scalable Uncertainty Management, SUM 2013, held in Washington, DC, USA, in September 2013. The 26 revised full papers and 3 revised short papers were carefully reviewed and selected from 57 submissions. The papers cover topics in all areas of managing and reasoning with substantial and complex kinds of uncertain, incomplete or inconsistent information including applications in decision support systems, machine learning, negotiation technologies, semantic web applications, search engines, ontology systems, information retrieval, natural language processing, information extraction, image recognition, vision systems, data and text mining, and the consideration of issues such as provenance, trust, heterogeneity, and complexity of data and knowledge.

Keywords

Mechanical Engineering --- Engineering & Applied Sciences --- Computer Science --- Mechanical Engineering - General --- Computer science. --- Computer communication systems. --- Database management. --- Data mining. --- Information storage and retrieval. --- Artificial intelligence. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Computer Communication Networks. --- Database Management. --- Data Mining and Knowledge Discovery. --- Uncertainty (Information theory) --- Information storage and retrieva. --- Artificial Intelligence. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Distributed processing

Scalable uncertainty management : first international conference, SUM 2007, Washington, DC, USA, October 10-12, 2007 : proceedings
Authors: --- ---
ISBN: 9783540754077 3540754075 3540754105 Year: 2007 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Uncertainty (Information theory) --- Artificial intelligence --- Incertitude (Théorie de l'information) --- Intelligence artificielle --- Congresses. --- Congrès --- Computer Science --- Mechanical Engineering - General --- Mechanical Engineering --- Engineering & Applied Sciences --- Information Technology --- Artificial Intelligence --- Business. --- Management science. --- Mathematical logic. --- Artificial intelligence. --- Business and Management. --- Business and Management, general. --- Artificial Intelligence (incl. Robotics). --- Mathematical Logic and Formal Languages. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Quantitative business analysis --- Management --- Problem solving --- Operations research --- Statistical decision --- Trade --- Economics --- Commerce --- Industrial management --- Computer science. --- Artificial Intelligence. --- Informatics --- Science


Book
The Global Cyber-Vulnerability Report
Authors: --- --- ---
ISBN: 3319257587 3319257609 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the first book  that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored.  Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and  professionals including government and military workers, policy-makers and law-makers  working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.

Keywords

Computer Science --- Engineering & Applied Sciences --- Computer security. --- Cyberterrorism. --- Malware (Computer software) --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Artificial intelligence. --- System safety. --- Statistics. --- Computer Science. --- Systems and Data Security. --- Security Science and Technology. --- Statistics for Social Science, Behavorial Science, Education, Public Policy, and Law. --- Information Systems Applications (incl. Internet). --- Artificial Intelligence (incl. Robotics). --- Statistics for Social Science, Behavioral Science, Education, Public Policy, and Law. --- Data protection --- Security systems --- Hacking --- Statistical analysis --- Statistical data --- Statistical methods --- Statistical science --- Mathematics --- Econometrics --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Informatics --- Science --- Prevention --- Computer crimes --- Terrorism --- Computer software --- Statistics for Social Sciences, Humanities, Law. --- Artificial Intelligence. --- Electronic terrorism (Cyberterrorism) --- Statistics . --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software)


Book
A general framework for reasoning on inconsistency
Authors: --- --- ---
ISBN: 1461467497 1461467500 Year: 2013 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This SpringerBrief proposes a general framework for reasoning about inconsistency in a wide variety of logics, including inconsistency resolution methods that have not yet been studied.  The proposed framework allows users to specify preferences on how to resolve inconsistency when there are multiple ways to do so. This empowers users to resolve inconsistency in data leveraging both their detailed knowledge of the data as well as their application needs. The brief shows that the framework is well-suited to handle inconsistency in several logics, and provides algorithms to compute preferred options. Finally, the brief shows that the framework not only captures several existing works, but also supports reasoning about inconsistency in several logics for which no such methods exist today.

Keywords

Computer logic. --- Inconsistency (Logic). --- Logic design. --- Logic. --- Reasoning. --- Engineering & Applied Sciences --- Mechanical Engineering --- Computer Science --- Mechanical Engineering - General --- Information Technology --- Artificial Intelligence --- Artificial intelligence. --- Design, Logic --- Design of logic systems --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Argumentation --- Deduction (Logic) --- Deductive logic --- Dialectic (Logic) --- Logic, Deductive --- Computer science. --- Mathematical logic. --- Database management. --- Data mining. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Database Management. --- Logics and Meanings of Programs. --- Data Mining and Knowledge Discovery. --- Mathematical Logic and Formal Languages. --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Digital electronics --- Electronic circuit design --- Logic circuits --- Switching theory --- Intellect --- Philosophy --- Psychology --- Science --- Reasoning --- Thought and thinking --- Methodology --- Artificial Intelligence. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Informatics --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Computer science logic --- Logic, Symbolic and mathematical --- Inconsistency (Logic)


Book
Data-driven generation of policies
Authors: --- --- ---
ISBN: 1493902733 1493902741 Year: 2014 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Springer Brief presents a basic algorithm that provides a correct solution to finding an optimal state change attempt, as well as an enhanced algorithm that is built on top of the well-known trie data structure. It explores correctness and algorithmic complexity results for both algorithms and experiments comparing their performance on both real-world and synthetic data. Topics addressed include optimal state change attempts, state change effectiveness, different kind of effect estimators, planning under uncertainty and experimental evaluation. These topics will help researchers analyze tabular data, even if the data contains states (of the world) and events (taken by an agent) whose effects are not well understood. Event DBs are omnipresent in the social sciences and may include diverse scenarios from political events and the state of a country to education-related actions and their effects on a school system. With a wide range of applications in computer science and the social sciences, the information in this Springer Brief is valuable for professionals and researchers dealing with tabular data, artificial intelligence and data mining. The applications are also useful for advanced-level students of computer science.

Keywords

Computer networks. --- Computer science -- Congresses. --- Computer science. --- Computer algorithms --- Artificial intelligence --- Engineering & Applied Sciences --- Mechanical Engineering --- Computer Science --- Mechanical Engineering - General --- Database management. --- Computer algorithms. --- Artificial intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Mathematical statistics. --- Data mining. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Data Mining and Knowledge Discovery. --- Database Management. --- Probability and Statistics in Computer Science. --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithms --- Artificial Intelligence. --- Informatics --- Science --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Mathematics --- Statistical inference --- Statistics, Mathematical --- Statistics --- Probabilities --- Sampling (Statistics) --- Statistical methods


Book
Cyber Deception : Building the Scientific Foundation
Authors: --- --- ---
ISBN: 331932697X 3319326996 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Electrical engineering. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Data Encryption. --- Communications Engineering, Networks. --- Computer fraud. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Electric engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Distributed processing --- Computer crimes --- Fraud --- Telecommunication. --- Cryptology. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Heterogeneous agent systems
Authors: --- ---
ISBN: 0262526492 0262194368 0262284561 0585444811 9780262284561 9780262526494 9780585444819 9780262194365 Year: 2000 Publisher: Cambridge, Massachusetts [Piscataqay, New Jersey] MIT Press IEEE Xplore

Loading...
Export citation

Choose an application

Bookmark

Abstract

Software agents are the latest advance in the trend toward smaller, modular pieces of code, where each module performs a well-defined, focused task or set of tasks. Programmed to interact with and provide services to other agents, including humans, software agents act autonomously with prescribed backgrounds, beliefs, and operations. Systems of agents can access and manipulate heterogeneously stored data such as that found on the Internet. After a discussion of the theory of software agents, this book presents IMPACT (Interactive Maryland Platform for Agents Collaborating Together), an experimental agent infrastructure that translates formal theories of agency into a functional multiagent system that can extend legacy software code and application-specific or legacy data structures. The book describes three sample applications: a store, a self-correcting auto-pilot, and a supply chain.

Listing 1 - 10 of 15 << page
of 2
>>
Sort by