000771481 000__ 02588cam\a2200481Ii\4500 000771481 001__ 771481 000771481 005__ 20230306142610.0 000771481 006__ m\\\\\o\\d\\\\\\\\ 000771481 007__ cr\un\nnnunnun 000771481 008__ 140919t20142015sz\a\\\\o\\\\\000\0\eng\d 000771481 020__ $$a9783319086248$$q(electronic book) 000771481 020__ $$a3319086243$$q(electronic book) 000771481 020__ $$z9783319086231 000771481 0247_ $$a10.1007/978-3-319-08624-8$$2doi 000771481 035__ $$aSP(OCoLC)ocn890906314 000771481 035__ $$aSP(OCoLC)890906314 000771481 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dCOO$$dUWO$$dOCLCF$$dOCLCQ$$dOCLCO$$dIAO$$dIAS$$dIAD$$dJBG 000771481 049__ $$aISEA 000771481 050_4 $$aQ342 000771481 08204 $$a006.3$$223 000771481 24500 $$aIntelligent methods for cyber warfare /$$cRonald R. Yager, Marek Z. Reformat, Naif Alajlan, editors. 000771481 264_1 $$aCham :$$bSpringer,$$c[2014] 000771481 264_4 $$c©2015 000771481 300__ $$a1 online resource (xii, 278 pages) :$$billustrations. 000771481 336__ $$atext$$btxt$$2rdacontent 000771481 337__ $$acomputer$$bc$$2rdamedia 000771481 338__ $$aonline resource$$bcr$$2rdacarrier 000771481 4901_ $$aStudies in Computational Intelligence,$$x1860-949X ;$$vvolume 563 000771481 5050_ $$aMalware and Machine Learning -- Soft Computing Based Epidemical Crisis Prediction -- An ACP-Based Approach to Intelligence and Security Informatics -- Microfiles as a Potential Source of Confidential Information Leakage -- Decision Support in Open Source Intelligence -- Information Fusion Process Design Issues for Hard and Soft Information: Developing an Initial Prototype -- Intrusion Detection with Type-2 Fuzzy Ontologies and Similarity Measures -- A multi-objective genetic algorithm based approach for effective intrusion detection using neural networks -- Cyber Insider Mission Detection for Situation Awareness -- A Game Theoretic Engine for Cyber Warfare -- Mission Impact Assessment for Cyber Warfare -- Uncertainty modeling: the Computational Economists{u2019} View on Cyberwarfare. 000771481 506__ $$aAccess limited to authorized users. 000771481 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 19, 2014). 000771481 650_0 $$aComputational intelligence. 000771481 650_0 $$aMachine learning. 000771481 650_0 $$aInternet$$xSecurity measures. 000771481 650_0 $$aComputer networks$$xSecurity measures. 000771481 7001_ $$aYager, Ronald R.,$$d1941-$$eeditor. 000771481 7001_ $$aReformat, Marek,$$eeditor. 000771481 7001_ $$aAlajlan, Naif,$$eeditor. 000771481 830_0 $$aStudies in computational intelligence ;$$vv. 563. 000771481 85280 $$bebk$$hSpringerLink 000771481 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-08624-8$$zOnline Access$$91397441.1 000771481 909CO $$ooai:library.usi.edu:771481$$pGLOBAL_SET 000771481 980__ $$aEBOOK 000771481 980__ $$aBIB 000771481 982__ $$aEbook 000771481 983__ $$aOnline 000771481 994__ $$a92$$bISE