Skip to content
You are not logged in |Login  
     
Limit search to available items
49 results found. Sorted by relevance | date | title .
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book
Author Petrenko, Sergei, author.

Title Developing a cybersecurity immune system for industry 4.0 / Sergei Petrenko.

Publication Info. Gistrup, Denmark : RIVER Publishers, [2020]

Item Status

Description 1 online resource.
text file
Series River Publishers Series in Security and Digital Forensics
River Publishers series in security and digital forensics.
Bibliography Includes bibliographical references and index.
Summary This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks.
Contents Foreword vii Preface xiii Acknowledgments xv -- List of Figures xvii -- List of Tables xxvii -- List of Abbreviations xxix Glossary xxxvii Introduction 1 -- 1 Cyber Immunity Concept of the Industry 4.0 -- 5 1.1 Cybersecurity Threat Landscape 6 -- 1.2 Geography of the Cyber-Attacks 19 -- 1.3 Biological Metaphor for Cyber Immunity of Industry 4.0 -- 23 -- 1.4 Prerequisites for the Creation of Cyber Immunity of Industry 4.0 -- 28 -- 1.5 An Even Older Immune Defense Organization 38 -- 1.6 Place of the Immune System of Protection 45 -- 1.7 Development of the Concept of Cyber Immunity of Industry 4.0 -- 50 -- 2 Mathematical Framework for Immune Protection of Industry 4.0 -- 67 -- 2.1 Known Mathematical Basis of Immune Protection 68 -- 2.2 Known Immune Response Models 77 -- 2.3 First Immune Response Software Systems 86 -- 2.4 Problem of the "Digital Bombs" Neutralization 96 -- 2.5 Program Faults Detection Method 108 -- 2.6 Introducing a Passport System for Programs 118 -- 2.7 "Digital Bombs" Neutralization Method 133 -- 2.8 Basic Definitions of Cyber Resilience 148 -- 2.9 Mathematical Formulation of the Cyber Resilience Control Problem 162 -- 3 Trends and Prospects of the Development of Immune Protection of Industry 4.0 -- 177 -- 3.1 Artificial Immune Networks 178 -- 3.2 Immunocomputing 190 -- 3.3 Hybrid Intelligent Protection System 200 -- 3.4 Detection of Anomalies Based on Dimensions 208 -- 3.5 Innovative Methods for Detecting Anomalies 220 -- 3.6 Data Processing Model on the Example of Oracle Solution 235 -- 3.7 Control of the Platform Semantic Correctness 250 -- 4 From the Detection of Cyber-Attacks to Self-Healing Industry 4.0 -- 265 -- 4.1 Classification of Methods for Detecting Cyber-Attacks and Anomalies 266 -- 4.2 Evaluation of the Known Methods for Detecting Cyber-Attacks and Anomalies 275 -- 4.3 Innovative Immune Response Method 287 -- 4.4 Immune Response Method Implementation 300 -- 4.5 Development of Immune Response Method 314 -- 4.6 Intellectual Cyber Resilience Orchestration 323.
4.7 The Semantic Correctness Control 338 -- 4.8 Organization of Self-Healing Computing 345 -- 4.9 New Scientific and Practical Results 366 Conclusion 377 -- References 379 -- Index 405 -- About the Author 409.
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject Computer security.
Computer security.
Other Form: Print version: 877022188X 9788770221887 (OCoLC)1149308515
ISBN 9788770221870 (electronic book)
8770221871 (electronic book)
877022188X
9788770221887