Theory and Models for Cyber Situation Awareness

Today, when a security incident happens, the top three questions a cyber operation center would ask are: What has happened? Why did it happen? What should I do? Answers to the first two questions form the core of Cyber Situation Awareness (SA). Whether the last question can be satisfactorily address...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Liu, Peng (Editor), Jajodia, Sushil (Editor), Wang, Cliff (Editor)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2017.
Series:Lecture Notes in Computer Science, 10030
Subjects:
Online Access:Full Text via HEAL-Link
LEADER 03355nam a22005895i 4500
001 978-3-319-61152-5
003 DE-He213
005 20170706172241.0
007 cr nn 008mamaa
008 170706s2017 gw | s |||| 0|eng d
020 |a 9783319611525  |9 978-3-319-61152-5 
024 7 |a 10.1007/978-3-319-61152-5  |2 doi 
040 |d GrThAP 
050 4 |a QA76.76.A65 
072 7 |a UNH  |2 bicssc 
072 7 |a UDBD  |2 bicssc 
072 7 |a COM032000  |2 bisacsh 
082 0 4 |a 005.7  |2 23 
245 1 0 |a Theory and Models for Cyber Situation Awareness  |h [electronic resource] /  |c edited by Peng Liu, Sushil Jajodia, Cliff Wang. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a VII, 227 p. 71 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 10030 
505 0 |a Computer-aided human centric cyber situation awareness -- Computer and information science aspects of the recent advances in cyber situation awareness -- Learning and decision making aspects of the recent advances in cyber situation awareness -- Cognitive science aspects of the recent advances in cyber situation awareness. 
520 |a Today, when a security incident happens, the top three questions a cyber operation center would ask are: What has happened? Why did it happen? What should I do? Answers to the first two questions form the core of Cyber Situation Awareness (SA). Whether the last question can be satisfactorily addressed is largely dependent upon the cyber situation awareness capability of an enterprise. The goal of this book is to present a summary of recent research advances in the development of highly desirable Cyber Situation Awareness capabilities. The 8 invited full papers presented in this volume are organized around the following topics: computer-aided human centric cyber situation awareness; computer and information science aspects of the recent advances in cyber situation awareness; learning and decision making aspects of the recent advances in cyber situation awareness; cognitive science aspects of the recent advances in cyber situation awareness. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science). 
650 0 |a Algorithms. 
650 0 |a Artificial intelligence. 
650 1 4 |a Computer Science. 
650 2 4 |a Information Systems Applications (incl. Internet). 
650 2 4 |a Artificial Intelligence (incl. Robotics). 
650 2 4 |a Data Encryption. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Algorithm Analysis and Problem Complexity. 
700 1 |a Liu, Peng.  |e editor. 
700 1 |a Jajodia, Sushil.  |e editor. 
700 1 |a Wang, Cliff.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319611518 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 10030 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-61152-5  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)