Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Cyberspace Mimic Defense

Best Price (Coupon Required):
Buy Cyberspace Mimic Defense for $152.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $169.00 - $169.00
BEST PRICE

Single Product Purchase

$152.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$169.00 $169.00

10% OFF
This deals requires coupon
$152.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783030298432
Condition
New
Product Description

This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change the easy-to-attack and difficult-to-defend game in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic mimic defense fog, and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats. Although progress has been made in the current security defense theories in cyberspace and various types of security technologies have come into being, the effectiveness of such theories and technologies often depends on the scale of the prior knowledge of the attackers, on the part of the defender and on the acquired real-timing and accuracy regarding the attackers behavior features and other information. Hence, there lacks an efficient active defense means to deal with uncertain security threats from the unknown. Even if the bottom-line defense technologies such as encrypted verification are adopted, the security of hardware/software products cannot be quantitatively designed, verified or measured. Due to the loose coupling relationship and border defense modes between the defender and the protected target, there exist insurmountable theoretical and technological challenges in the protection of the defender and the target against the utilization of internal vulnerabilities or backdoors, as well as in dealing with attack scenarios based on backdoor-activated collaboration from both inside and outside, no matter how augmented or accumulated protective measures are adopted. Therefore, it is urgent to jump out of the stereotyped thinking based onconventional defense theories and technologies, find new theories and methods to effectively reduce the utilization of vulnerabilities and backdoors of the targets without relying on the priori knowledge and feature information, and to develop new technological means to offset uncertain threats based on unknown vulnerabilities and backdoors from an innovative perspective. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandoras box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Real Analytic and Algebraic Geometry

Real Analytic and Algebraic Geometry

$34.99
Dictionary of the Teenage Revolution and Its Aftermath

Dictionary of the Teenage Revolution and Its Aftermath

$19.99
Public Pension Reforms in China

Public Pension Reforms in China

$119.00
Belowground Responses to Rising Atmospheric CO2: Implications for Plants, Soil Biota, and Ecosystem

Belowground Responses to Rising Atmospheric CO2: Implications for Plants, Soil Biota, and Ecosystem

$109.99
Foundation 3ds Max 8 Architectural Visualization

Foundation 3ds Max 8 Architectural Visualization

$54.99
Surgery of the Esophagus and Stomach

Surgery of the Esophagus and Stomach

$54.99
Wohlfahrtsstaaten und Geschlechterungleichheit in Mittel- und Osteuropa

Wohlfahrtsstaaten und Geschlechterungleichheit in Mittel- und Osteuropa

$69.99
The Lerma-Chapala Watershed

The Lerma-Chapala Watershed

$109.99
Genetic Algorithms for Control and Signal Processing

Genetic Algorithms for Control and Signal Processing

$84.99
Pedestrian and Evacuation Dynamics

Pedestrian and Evacuation Dynamics

$169.00
Die Analyse von Wettbewerbsbeziehungen mit Scannerdaten

Die Analyse von Wettbewerbsbeziehungen mit Scannerdaten

$59.99
A Global History of Warfare and Technology

A Global History of Warfare and Technology

$109.00
Economics and Management of Education

Economics and Management of Education

$54.99
Workload Characterization for Computer System Design

Workload Characterization for Computer System Design

$109.99
On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence

On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence

$179.99
Partizipationsbiographien Jugendlicher

Partizipationsbiographien Jugendlicher

$74.99
Methods in Medicine

Methods in Medicine

$39.99
Genetics and Genomics of Populus

Genetics and Genomics of Populus

$169.00
Niebrauch an privatem und betrieblichem Grundbesitz

Niebrauch an privatem und betrieblichem Grundbesitz

$74.99
Einflussfaktoren auf Beschaffungsorganisationen

Einflussfaktoren auf Beschaffungsorganisationen

$44.99
The Handbook of Plant Biosecurity

The Handbook of Plant Biosecurity

$379.99
Lebensbedrohliche ventrikulre Herzrhythmusstrungen

Lebensbedrohliche ventrikulre Herzrhythmusstrungen

$54.99
Die konomisierung der Bundeswehr

Die konomisierung der Bundeswehr

$64.99
EINFACH mehr Umsatz

EINFACH mehr Umsatz

$29.99
Beitrge zur Wissenssoziologie, Beitrge zur Religionssoziologie / Contributions to the Sociology of

Beitrge zur Wissenssoziologie, Beitrge zur Religionssoziologie / Contributions to the Sociology of

$49.99
Risk Analysis in Nuclear Waste Management

Risk Analysis in Nuclear Waste Management

$54.99
Atlas der Normalen und Pathologischen Handskeletentwicklung

Atlas der Normalen und Pathologischen Handskeletentwicklung

$44.99
Interdisziplinre Architektur-Wissenschaft

Interdisziplinre Architektur-Wissenschaft

$64.99
Vegetation Dynamics in Temperate Lowland Primeval Forests

Vegetation Dynamics in Temperate Lowland Primeval Forests

$109.99
Flexibility and Adjustment to Information in Sequential Decision Problems

Flexibility and Adjustment to Information in Sequential Decision Problems

$54.99
The Irish Medical Profession and the First World War

The Irish Medical Profession and the First World War

$99.99
Intellectual Property Statistics

Intellectual Property Statistics

$139.99
Democracy in the EMU in the Aftermath of the Crisis

Democracy in the EMU in the Aftermath of the Crisis

$169.99
Current Mammalogy

Current Mammalogy

$329.99
Urban Space and National Identity in Early Twentieth Century So Paulo, Brazil

Urban Space and National Identity in Early Twentieth Century So Paulo, Brazil

$39.99
Emil du Bois-Reymond (18181896) Anton Dohrn (18401909)

Emil du Bois-Reymond (18181896) Anton Dohrn (18401909)

$59.99
Handbuch der Vermessungskunde

Handbuch der Vermessungskunde

$89.00
Neural Network-Based State Estimation of Nonlinear Systems

Neural Network-Based State Estimation of Nonlinear Systems

$84.99
Computational Probability

Computational Probability

$139.99
Las aventuras de Jovani y Alejandro

Las aventuras de Jovani y Alejandro

$5.21
previous
next