Absolutely Australia's Lowest Prices

Shop over 1.5 Million Toys in our Huge New Range

Cyber Situational Awareness


Product Description
Product Details

Table of Contents

Chapter 1: Introduction to Cyber Situational Awareness Lead authors: Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang Chapter 2: Information Fusion for Cyber Situational Awareness Lead author: George Tadda, AFRL --------------------------------------------------------------------- Section: Macroscopic Cyber Situational Awareness -------------------------------------------------------------------- Chapter 3: Cyber Situational Awareness through Network Telescopes Lead authors: Vern Paxson (Berkeley), P. Barford (Wisconsin) Chapter 4: Using Honeynets to Gain Internet Situational Awareness Lead author: Mark Dacier, EURECOM Chapter 5: Internet-Scale Cyber Threat Analysis Lead author: Phillip Porras, SRI International -------------------------------------------------------------------- Section: Enterprise Cyber Situational Awareness -------------------------------------------------------------------- Chapter 6: Topological Vulnerability Analysis Lead author: Sushil Jajodia Chapter 7: Intrusion Detection and Alert Correlation Lead author: Peng Ning Chapter 8: Damage assessment and intrusion response Lead author: Peng Liu ------------------------------------------------------------------------- Section: Microscopic Cyber Situational Awareness -------------------------------------------------------------------------- Chapter 9: Microscopic Cyber Situational Awareness: Needs, Challenges and Solutions Lead author: Dawn Song, Berkeley {Backup author: Peng Liu} Chapter 10: Intrusion Back-tracking and Forensics Lead author: Peter Chen, Michigan Chapter 11: System Call Level Cyber Situational Awareness Lead authors: Jha & Griffin ----------------------------------------- Section: The Data Dimension ------------------------------------------ Chapter 12: A Data Stream Analysis Approach to Cyber Situational Awareness Lead author: Sharad Mehrotra, UC Irvine ----------------------------------------------------------------------- Section: Decision Making & Leaning Aspects ------------------------------------------------------------------------ Chapter 13: RPD-inspired Hypothesis Reasoning for Cyber Situation Awareness Lead authors: John Yen, Penn State University Chapter 14: Automated Human Analyst Situation Awareness Cognition Lead author: unknown {candidate author: Mike McNeese, Penn State University) Chapter 15: Uncertainty and Risk Management in Cyber Situation Awareness Lead author: unknown

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
People also searched for
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Cyber Situational Awareness (Advances in Information Security) on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond.com, Inc.
Back to top