Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Game Theory and Machine Learning for Cyber Security - Research Book

Game Theory and Machine Learning for Cyber Security - Research Book

Good Research Book in Game Theory and Machine Learning for Cyber Security

Author(s) Name:  Charles A. Kamhoua, Christopher D. Kiekintveld, Fei Fang, Quanyan Zhu

About the Book:

   In Game Theory and Machine Learning for Cyber Security, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security.
   Readers will explore the vulnerabilities of traditional machine learning algorithms and how they can be mitigated in an adversarial machine learning approach. The book offers a comprehensive suite of solutions to a broad range of technical issues in applying game theory and machine learning to solve cyber security challenges.
   Beginning with an introduction to foundational concepts in game theory, machine learning, cyber security, and cyber deception, the editors provide readers with resources that discuss the latest in hypergames, behavioral game theory, adversarial machine learning, generative adversarial networks, and multi-agent reinforcement learning.
Readers will also enjoy:

  • A thorough introduction to game theory for cyber deception, including scalable algorithms for identifying stealthy attackers in a game theoretic framework, honeypot allocation over attack graphs, and behavioral games for cyber deception
  • An exploration of game theory for cyber security, including actionable game-theoretic adversarial intervention detection against advanced persistent threats
  • Practical discussions of adversarial machine learning for cyber security, including adversarial machine learning in 5G security and machine learning-driven fault injection in cyber-physical systems
  • In-depth examinations of generative models for cyber security

  • Table of Contents

  • Chapter 1: Introduction
  • Chapter 2: Introduction to Game Theory
  • Chapter 3: Scalable Algorithms for Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception
  • Chapter 4: Honeypot Allocation Game over Attack Graphs for Cyber Deception
  • Chapter 5: Evaluating Adaptive Deception Strategies for Cyber Defense with Human Experimentation
  • Chapter 6: A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception
  • Chapter 7: Minimax Detection (MAD) for Computer Security: A Dynamic Program Characterization
  • Chapter 8: Sensor Manipulation Games in Cyber Security
  • Chapter 9: Adversarial Gaussian Process Regression in Sensor Networks
  • Chapter 10: Moving Target Defense Games for Cyber Security: Theory and Applications Abdelrahman Eldosouky, Shamik Sengupta
  • Chapter 11: Continuous Authentication Security Games
  • Chapter 12: Cyber Autonomy in Software Security: Techniques and Tactics
  • Chapter 13: A Game Theoretic Perspective on Adversarial Machine Learning and Related Cybersecurity Applications
  • Chapter 14: Adversarial Machine Learning in 5G Communications Security
  • Chapter 15: Machine Learning in the Hands of a Malicious Adversary: A Near Future If Not Reality
  • Chapter 16: Trinity: Trust, Resilience and Interpretability of Machine Learning Models
  • Chapter 17: Evading Machine Learning based Network Intrusion Detection Systems with GANs Bolor
  • Chapter 18: Concealment Charm (ConcealGAN): Automatic Generation of Steganographic Text using Generative Models to Bypass Censorship
  • Chapter 19: Manipulating Reinforcement Learning: Stealthy Attacks on Cost Signals
  • Chapter 20: Resource-Aware Intrusion Response based on Deep Reinforcement Learning for Software-Defined Internet-of-Battle-Things
  • Chapter 21: Smart Internet Probing: Scanning Using Adaptive Machine Learning
  • Chapter 22: Semi-automated Parameterization of a Probabilistic Model using Logistic Regression - A Tutorial
  • Chapter 23: Resilient Distributed Adaptive Cyber-Defense using Blockchain
  • Chapter 24: Summary and Future Work
  • ISBN:  978-1-119-72392-9

    Publisher:  Wiley-IEEE Press

    Year of Publication:  2021

    Book Link:  Home Page Url