Your browser does not support JavaScript!

Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications

Buy e-book PDF
(plus tax if applicable)
Buy print edition
image of Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications
Editors: El-Sayed M. El-Alfy 1 ; Mohamed Eltoweissy 2 ; Errin W. Fulp 3 ; Wojciech Mazurczyk 4
View affiliations
Publication Year: 2019

With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative computing, and virtual and mixed reality environments. Maintaining their security, trustworthiness and resilience to cyber-attacks has become crucial which requires innovative and creative cyber security and resiliency solutions. Computing algorithms have been developed to mimic the operation of natural processes, phenomena and organisms such as artificial neural networks, swarm intelligence, deep learning systems, biomimicry, and more. The amazing characteristics of these systems offer a plethora of novel methodologies and opportunities to cope with emerging cyber challenges. This edited book presents a timely review of the fundamentals, latest developments and diverse applications of nature-inspired algorithms in cyber security and resiliency. Topics include bio-inspired collaboration and cyber security; immune-based defense and resiliency; bio-inspired security and resiliency of network traffic; nature inspired machine learning approach for cyber security; nature-inspired algorithms in A.I. for malicious activity detection; DNA-inspired characterization and detection of novel social Twitter spambots; nature-inspired approaches for social network security; bio-inspired cyber-security for smart grid; natureinspired cryptography and cryptanalysis, and more.

Inspec keywords: trusted computing; security of data; fault tolerant computing; biomimetics

Other keywords: data processing; resilience to attacks; cyber security; nature-inspired algorithms; trustworthiness; distributed cooperative monitoring

Subjects: Data security; Computing security management; General and management topics

Related content

This is a required field
Please enter a valid email address