001469709 000__ 05281cam\\22006377i\4500 001469709 001__ 1469709 001469709 003__ OCoLC 001469709 005__ 20230803003343.0 001469709 006__ m\\\\\o\\d\\\\\\\\ 001469709 007__ cr\cn\nnnunnun 001469709 008__ 230616s2023\\\\sz\a\\\\ob\\\\000\0\eng\d 001469709 019__ $$a1381200649$$a1381710952 001469709 020__ $$a9783031292699$$q(electronic bk.) 001469709 020__ $$a3031292693$$q(electronic bk.) 001469709 020__ $$z3031292685 001469709 020__ $$z9783031292682 001469709 0247_ $$a10.1007/978-3-031-29269-9$$2doi 001469709 035__ $$aSP(OCoLC)1382627312 001469709 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dYDX$$dUKAHL$$dOCLCF 001469709 049__ $$aISEA 001469709 050_4 $$aU167.5.C92 001469709 08204 $$a355.4$$223/eng/20230616 001469709 24500 $$aAutonomous intelligent cyber defense agent (AICA) :$$ba comprehensive guide /$$cAlexander Kott, editor. 001469709 264_1 $$aCham, Switzerland :$$bSpringer,$$c2023. 001469709 300__ $$a1 online resource (460 pages) :$$billustrations (black and white, and color). 001469709 336__ $$atext$$btxt$$2rdacontent 001469709 337__ $$acomputer$$bc$$2rdamedia 001469709 338__ $$aonline resource$$bcr$$2rdacarrier 001469709 4901_ $$aAdvances in information security ;$$vvolume 87 001469709 504__ $$aIncludes bibliographical references. 001469709 5050_ $$aChapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and Overview -- Chapter. 2. Alternative Architectural Approaches -- Chapter. 3. Perception of Environment -- Chapter. 4. Perception of Cyber Threats -- Chapter. 5. Situational Understanding and Diagnostics -- Chapter. 6. Learning about the Adversary -- Chapter. 7. Response Planning -- Chapter. 8. Recovery Planning -- Chapter. 9. Strategic Cyber Camouflage -- Chapter. 10. Adaptivity & Antifragility -- Chapter. 11. Negotiation and Collaboration -- Chapter. 12. Human Interactions -- Chapter. 13. Testing and Measurements -- Chapter. 14. Deployment and Operation -- Chapter. 15. Command in AICA-intensive Operations -- Chapter. 16. Risk Management -- Chapter. 17. Policy Issues -- Chapter. 18. Development Challenges -- Chapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense Agent -- Chapter. 20. Case Study B: AI Agents for Tactical Edge -- Chapter. 21. Case Study C: the Sentinel Agents. 001469709 506__ $$aAccess limited to authorized users. 001469709 520__ $$aThis book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is accessible to non-specialists, with tutorial information provided in the initial chapters and as needed throughout the book. The reader is provided with clear and comprehensive background and reference material for each aspect of AICA. Todays cyber defense tools are mostly watchers. They are not active doers. They do little to plan and execute responses to attacks, and they dont plan and execute recovery activities. Response and recovery core elements of cyber resilience are left to human cyber analysts, incident responders and system administrators. This is about to change. The authors advocate this vision, provide detailed guide to how such a vision can be realized in practice, and its current state of the art. This book also covers key topics relevant to the field, including functional requirements and alternative architectures of AICA, how it perceives and understands threats and the overall situation, how it plans and executes response and recovery, how it survives threats, and how human operators deploy and control AICA. Additionally, this book covers issues of testing, risk, and policy pertinent to AICA, and provides a roadmap towards future R&D in this field. This book targets researchers and advanced students in the field of cyber defense and resilience. Professionals working in this field as well as developers of practical products for cyber autonomy will also want to purchase this book. 001469709 588__ $$aDescription based on print version record. 001469709 650_0 $$aCyberspace$$xSecurity measures. 001469709 650_0 $$aCyberterrorism$$xPrevention. 001469709 650_0 $$aMilitary surveillance. 001469709 650_0 $$aDefensive (Military science) 001469709 655_0 $$aElectronic books. 001469709 7001_ $$aKott, Alexander,$$d1971-$$eeditor. 001469709 77608 $$iPrint version:$$tAUTONOMOUS INTELLIGENT CYBER DEFENSE AGENT (AICA).$$d[Place of publication not identified] : SPRINGER INTERNATIONAL PU, 2023$$z3031292685$$w(OCoLC)1371015210 001469709 830_0 $$aAdvances in information security ;$$v87. 001469709 852__ $$bebk 001469709 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-29269-9$$zOnline Access$$91397441.1 001469709 909CO $$ooai:library.usi.edu:1469709$$pGLOBAL_SET 001469709 980__ $$aBIB 001469709 980__ $$aEBOOK 001469709 982__ $$aEbook 001469709 983__ $$aOnline 001469709 994__ $$a92$$bISE