Cybersecurity Systems for Human Cognition Augmentation Cybersecurity Systems for Human Cognition Augmentation
Advances in Information Security

Cybersecurity Systems for Human Cognition Augmentation

Robinson E. Pino and Others
    • $84.99
    • $84.99

Publisher Description

This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.

GENRE
Computers & Internet
RELEASED
2014
October 18
LANGUAGE
EN
English
LENGTH
225
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
4.8
MB
Cyber-Physical Systems Security Cyber-Physical Systems Security
2018
Adversary-Aware Learning Techniques and Trends in Cybersecurity Adversary-Aware Learning Techniques and Trends in Cybersecurity
2021
Ubiquitous Security Ubiquitous Security
2023
Security and Artificial Intelligence Security and Artificial Intelligence
2022
Science of Cyber Security Science of Cyber Security
2021
Emerging Trends in ICT for Sustainable Development Emerging Trends in ICT for Sustainable Development
2021
Network Science and Cybersecurity Network Science and Cybersecurity
2013
Advances in Neuromorphic Memristor Science and Applications Advances in Neuromorphic Memristor Science and Applications
2012
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007