Skip to main content
  • Book
  • © 2014

Network Science and Cybersecurity

  • Introduces new research and development efforts for cybersecurity solutions and applications
  • Presents Memristor-based technologies for cybersecurity
  • Covers anomaly detection and algorithms for network security
  • Includes supplementary material: sn.pub/extras

Part of the book series: Advances in Information Security (ADIS, volume 55)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 chapters)

  1. Front Matter

    Pages i-x
  2. Recognizing Unexplained Behavior in Network Traffic

    • Massimiliano Albanese, Robert F. Erbacher, Sushil Jajodia, C. Molinaro, Fabio Persia, Antonio Picariello et al.
    Pages 39-62
  3. Applying Cognitive Memory to CyberSecurity

    • Bruce McCormick
    Pages 63-73
  4. Understanding Cyber Warfare

    • Yan M. Yufik
    Pages 75-91
  5. Design of Neuromorphic Architectures with Memristors

    • Dhireesha Kudithipudi, Cory Merkel, Mike Soltiz, Garrett S. Rose, Robinson E. Pino
    Pages 93-103
  6. Nanoelectronics and Hardware Security

    • Garrett S. Rose, Dhireesha Kudithipudi, Ganesh Khedkar, Nathan McDonald, Bryant Wysocki, Lok-Kwong Yan
    Pages 105-123
  7. User Classification and Authentication for Mobile Device Based on Gesture Recognition

    • Kent W. Nixon, Yiran Chen, Zhi-Hong Mao, Kang Li
    Pages 125-135
  8. Hardware-Based Computational Intelligence for Size, Weight, and Power Constrained Environments

    • Bryant Wysocki, Nathan McDonald, Clare Thiem, Garrett Rose, Mario Gomez II
    Pages 137-153
  9. Machine Learning Applied to Cyber Operations

    • Misty Blowers, Jonathan Williams
    Pages 155-175
  10. Detecting Kernel Control-Flow Modifying Rootkits

    • Xueyang Wang, Ramesh Karri
    Pages 177-187
  11. Alert Data Aggregation and Transmission Prioritization over Mobile Networks

    • Hasan Cam, Pierre A. Mouallem, Robinson E. Pino
    Pages 205-220
  12. Semantic Features from Web-Traffic Streams

    • Steve Hutchinson
    Pages 221-237
  13. Hardware Accelerated Mining of Domain Knowledge

    • Tanvir Atahary, Scott Douglass, Tarek M. Taha
    Pages 251-271
  14. Memristors and the Future of Cyber Security Hardware

    • Michael J. Shevenell, Justin L. Shumaker, Arthur H. Edwards, Robinson E. Pino
    Pages 273-285

About this book

Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of  Defense, industry and academic laboratories.

This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks.  These attacks  may not yet be known or have well-developed signatures.  Methods are also suggested to simplify the construction of metrics in such a manner that they retain their ability to effectively cluster data, while simultaneously easing human interpretation of outliers.

This is a professional book for practitioners or government employees working in cybersecurity, and can also be used as a reference.  Advanced-level students in computer science or electrical engineering studying security will also find this book useful . 

Reviews

From the reviews:

“The book is meant for students, engineers, technicians, and researchers in fields such as information security and systems engineering. ... The book showcases some of the latest advances in the field of information security. The papers included are very heterogeneous; however, they all come under the common theme of network science and cybersecurity. The book is of high quality and is praiseworthy.” (S. V. Nagaraj, Computing Reviews, May, 2014)

Editors and Affiliations

  • ICF International, Fairfax, USA

    Robinson E. Pino

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access