SwePub
Sök i LIBRIS databas

  Extended search

onr:"13373802"
 

Search: onr:"13373802" > Use of Risk Analysi...

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist
  • Duman, E.(author)

Use of Risk Analysis in Computer-Aided Persuasion

  • E-bookEnglish2011

Publisher, publication year, extent ...

  • Amsterdam :IOS Press,2011
  • 1 online resource (348 p.)

Numbers

  • LIBRIS-ID:13373802
  • ISBN:9781607508281196 (NL)
  • Invalid number / Other version:9781607508274 (print)

Supplementary language notes

  • Language:English

Classification

Series

  • NATO Science for Peace and Security Series E: Human and Societal Dynamics

Notes

  • Description based upon print version of record.
  • USE OF RISK ANALYSIS IN COMPUTER-AIDEDPERSUASION; Preface; Contents; Part I - Fraud and Financial; A Framework for Modeling Network Risk; Centrality Measures in Shareholding Networks; Concealed Investment Strategy Threats; Asset Management System: Risk Analysis in Portfolio Selection using Fuzzy Logic; Using Social Networks for On-line Credit Card Fraud Analysis; Linear and Nonlinear Kernel Based Pattern Recognition: From Theory to Financial Practice; A Comparison of Classification Models on Credit Card Fraud Detection with respect to Cost-Based Performance Metrics
  • Part II - Threats to Security/Economic EntitiesProtecting from Intelligent Threats: Exposure of the Latest Developments in Defense -Attack Strategies; Automated Detection of Terrorist Web Documents using Fuzzy Lexicons with Fuzzy-based Clustering Methodology; A Stratified Environment of Intelligent Early Warning Agents for the General Problem of Asymmetric Threats; Role of Information Security in Intelligence; Risk Hedging in the Newsvendor Model; Fuzzy Risk Analysis in Underwater Intelligence System Issues and Advancement in Man/Machine Complex Swarms
  • A New Approach to Identify and Analyze Multi-leveled Risks: Extension of the Fuzzy FMEA MethodEvidential Risk Graph Model for Determining Safety Integrity Level; Variable Domain Eigenvalue Problems with Applications to Some Mechanical Systems; Part III - Networks/IT; Community Networks for Information Sharing; Operating SCADA Systems in Potential Risk Intrusion Network Environment and Risk Management; Continuous Computing Technologies For Mitigating IT-related Business Risks; Network Q-Learning Controls Prevent Cyber Intrusion Risks: Synergies of Control Theory and Computational Intelligence
  • Calibration of Customer Risk Scoring via Classification Techniques for Money Laundering PreventionNeural Network Rule Extraction and Decision Tables for Software Fault Prediction; Subject Index; Author Index;
  • Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities must be built into the network to allow for quick and automatic recovery with little or no interruption or loss. This book contains contributions to the NATO Advanced Research Workshop on The Use of Risk Analysis in Computer-Aided Persuasion held in Antalya, Turkey in May 2011. The goal has been to f

Subject headings and genre

Added entries (persons, corporate bodies, meetings, titles ...)

  • Atiya, A.(author)

Related titles

  • Other version:Print:Duman, E.Use of Risk Analysis in Computer-Aided Persuasion20119781607508274

fullvy:Serie_bilook_t

  • NATO Science for Peace and Security Series E: Human and Societal Dynamics

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Find more in SwePub

By the author/editor
Duman, E.
Atiya, A.
By the university
Swepub_uni:_t

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view