Use of Risk Analysis in Computer-Aided Persuasion ( NATO Science for Peace and Security Series - E: Human and Societal Dynamics )

Publication series : NATO Science for Peace and Security Series - E: Human and Societal Dynamics

Author: Duman E.;Atiya A.  

Publisher: Ios Press‎

Publication year: 2011

E-ISBN: 9781607508281

P-ISBN(Paperback): 9781607508274

Subject: D5 World Politics

Keyword: 世界政治

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities must be built into the network to allow for quick and automatic recovery with little or no interruption or loss. This book contains contributions to the NATO Advanced Research Workshop on The Use of Risk Analysis in Computer-Aided Persuasion held in Antalya, Turkey in May 2011. The goal has been to further the research and knowledge in the areas of combatting threats and risks to entities, systems, and networks. The papers presented here fall into three categories. The first deals with fraud and financial systems. The second one considers threats to security and economic entities. The third group of papers considers computer network, IT, and software threats. Cutting edge methods based on neural networks, social network analytics, Bayesian networks, decision trees, and risk hedging have been proposed in these works to deal with these challenging problems.

Chapter

Asset Management System: Risk Analysis in Portfolio Selection using Fuzzy Logic

Using Social Networks for On-line Credit Card Fraud Analysis

Linear and Nonlinear Kernel Based Pattern Recognition: From Theory to Financial Practice

A Comparison of Classification Models on Credit Card Fraud Detection with respect to Cost-Based Performance Metrics

Part II – Threats to Security/Economic Entities

Protecting from Intelligent Threats: Exposure of the Latest Developments in Defense -Attack Strategies

Automated Detection of Terrorist Web Documents using Fuzzy Lexicons with Fuzzy-based Clustering Methodology

A Stratified Environment of Intelligent Early Warning Agents for the General Problem of Asymmetric Threats

Role of Information Security in Intelligence

Risk Hedging in the Newsvendor Model

Fuzzy Risk Analysis in Underwater Intelligence System Issues and Advancement in Man/Machine Complex Swarms

A New Approach to Identify and Analyze Multi-leveled Risks: Extension of the Fuzzy FMEA Method

Evidential Risk Graph Model for Determining Safety Integrity Level

Variable Domain Eigenvalue Problems with Applications to Some Mechanical Systems

Part III – Networks/IT

Community Networks for Information Sharing

Operating SCADA Systems in Potential Risk Intrusion Network Environment and Risk Management

Continuous Computing Technologies For Mitigating IT-related Business Risks

Network Q-Learning Controls Prevent Cyber Intrusion Risks: Synergies of Control Theory and Computational Intelligence

Calibration of Customer Risk Scoring via Classification Techniques for Money Laundering Prevention

Neural Network Rule Extraction and Decision Tables for Software Fault Prediction

Subject Index

Author Index

The users who browse this book also browse