Use of risk analysis in computer-aided persuasion / edited by Ekrem Duman and Amir F. Atiya.

Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities m...

Full description

Saved in:
Bibliographic Details
Corporate Authors: NATO Advanced Research Workshop on the Use of Risk Analysis to Protect Against Intelligent Threats Antalya, Turkey, IOS Press
Other Authors: Duman, Ekrem, Atiya, Amir F.
Format: eBook
Language:English
Published: Amsterdam ; Washington, D.C. : IOS Press, ©2011.
Series:NATO science for peace and security series. Human and societal dynamics ; v. 88.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 a 4500
001 ocn772636235
003 OCoLC
005 20241006213017.0
006 m o d
007 cr cn|||||||||
008 120113s2011 ne ob 101 0 eng d
010 |z  2011938834 
040 |a IOSPR  |b eng  |e pn  |c IOSPR  |d EBLCP  |d MHW  |d N$T  |d E7B  |d YDXCP  |d MERUC  |d CDX  |d DEBSZ  |d OCLCQ  |d COO  |d GPM  |d OCLCQ  |d OCLCO  |d IDEBK  |d OCLCQ  |d OCLCO  |d S3O  |d OCLCO  |d OCLCQ  |d OCLCO  |d AZK  |d AGLDB  |d MOR  |d PIFAG  |d ZCU  |d NRC  |d OCLCQ  |d U3W  |d UUM  |d OCLCF  |d STF  |d JBG  |d WRM  |d VTS  |d ICG  |d EZ9  |d INT  |d VT2  |d OCLCQ  |d WYU  |d TKN  |d OCLCQ  |d DKC  |d OCLCQ  |d M8D  |d OCLCQ  |d VLY  |d OCLCQ  |d OCLCO  |d SFB  |d VHC  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 778314482  |a 817056629  |a 824106747  |a 961522896  |a 962703420  |a 1162552648  |a 1241919673  |a 1290106962  |a 1300486170  |a 1303462740 
020 |a 9781607508281  |q (electronic bk.) 
020 |a 1607508281  |q (electronic bk.) 
020 |a 9781607508274 
020 |a 1607508273 
020 |a 1283432986 
020 |a 9781283432986 
020 |a 6613432989 
020 |a 9786613432988 
035 |a (OCoLC)772636235  |z (OCoLC)778314482  |z (OCoLC)817056629  |z (OCoLC)824106747  |z (OCoLC)961522896  |z (OCoLC)962703420  |z (OCoLC)1162552648  |z (OCoLC)1241919673  |z (OCoLC)1290106962  |z (OCoLC)1300486170  |z (OCoLC)1303462740 
037 |a 978-1-60750-828-1  |b IOS Press  |n http://www.iospress.nl 
050 4 |a TK5105.59  |b .N38 2011 
072 7 |a COM  |x POL036000  |2 bisacsh 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
049 |a HCDD 
111 2 |a NATO Advanced Research Workshop on the Use of Risk Analysis to Protect Against Intelligent Threats  |d (2011 :  |c Antalya, Turkey) 
245 1 0 |a Use of risk analysis in computer-aided persuasion /  |c edited by Ekrem Duman and Amir F. Atiya. 
260 |a Amsterdam ;  |a Washington, D.C. :  |b IOS Press,  |c ©2011. 
300 |a 1 online resource (viii, 337 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
490 1 |a NATO science for peace and security series. E, Human and societal dynamics ;  |v v. 88 
500 |a "Proceedings of the NATO Advanced Research Workshop on The Use of Risk Analysis to Protect Against Intelligent Threats, Antalya, Turkey, 24-26 May 2011"--Title page verso 
500 |a International conference proceedings. 
500 |a Includes indexes. 
520 |a Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities must be built into the network to allow for quick and automatic recovery with little or no interruption or loss. This book contains contributions to the NATO Advanced Research Workshop on The Use of Risk Analysis in Computer-Aided Persuasion held in Antalya, Turkey in May 2011. The goal has been to f. 
505 0 |a USE OF RISK ANALYSIS IN COMPUTER-AIDEDPERSUASION; Preface; Contents; Part I -- Fraud and Financial; A Framework for Modeling Network Risk; Centrality Measures in Shareholding Networks; Concealed Investment Strategy Threats; Asset Management System: Risk Analysis in Portfolio Selection using Fuzzy Logic; Using Social Networks for On-line Credit Card Fraud Analysis; Linear and Nonlinear Kernel Based Pattern Recognition: From Theory to Financial Practice; A Comparison of Classification Models on Credit Card Fraud Detection with respect to Cost-Based Performance Metrics. 
504 |a Includes bibliographical references and indexes. 
546 |a English. 
650 0 |a Computer networks  |x Security measures  |v Congresses. 
650 0 |a National security  |x Risk assessment  |v Congresses. 
650 0 |a Data protection  |v Congresses. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Data protection  |2 fast 
655 7 |a Conference papers and proceedings  |2 fast 
700 1 |a Duman, Ekrem. 
700 1 |a Atiya, Amir F. 
710 2 |a IOS Press. 
758 |i has work:  |a Use of risk analysis in computer-aided persuasion (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCYQRvpxXdM89y3kqy3d6QV  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Use of risk analysis in computer-aided persuasion.  |d Amsterdam ; Washington, D.C. : IOS Press, ©2011  |z 9781607508274  |w (OCoLC)764387482 
830 0 |a NATO science for peace and security series.  |n E,  |p Human and societal dynamics ;  |v v. 88. 
856 4 0 |u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=836226  |y Click for online access 
903 |a EBC-AC 
994 |a 92  |b HCD