SwePub
Sök i LIBRIS databas

  Utökad sökning

WFRF:(Atiya A)
 

Sökning: WFRF:(Atiya A) > Use of Risk Analysi...

  • Duman, E.(författare)

Use of Risk Analysis in Computer-Aided Persuasion

  • E-bokEngelska2011

Förlag, utgivningsår, omfång ...

  • Amsterdam :IOS Press,2011
  • 1 online resource (348 p.)

Nummerbeteckningar

  • LIBRIS-ID:13373802
  • ISBN:9781607508281196 (NL)
  • Ogiltigt nummer / annan version:9781607508274 (print)

Kompletterande språkuppgifter

  • Språk:engelska

Klassifikation

Serie

  • NATO Science for Peace and Security Series E: Human and Societal Dynamics

Anmärkningar

  • Description based upon print version of record.
  • USE OF RISK ANALYSIS IN COMPUTER-AIDEDPERSUASION; Preface; Contents; Part I - Fraud and Financial; A Framework for Modeling Network Risk; Centrality Measures in Shareholding Networks; Concealed Investment Strategy Threats; Asset Management System: Risk Analysis in Portfolio Selection using Fuzzy Logic; Using Social Networks for On-line Credit Card Fraud Analysis; Linear and Nonlinear Kernel Based Pattern Recognition: From Theory to Financial Practice; A Comparison of Classification Models on Credit Card Fraud Detection with respect to Cost-Based Performance Metrics
  • Part II - Threats to Security/Economic EntitiesProtecting from Intelligent Threats: Exposure of the Latest Developments in Defense -Attack Strategies; Automated Detection of Terrorist Web Documents using Fuzzy Lexicons with Fuzzy-based Clustering Methodology; A Stratified Environment of Intelligent Early Warning Agents for the General Problem of Asymmetric Threats; Role of Information Security in Intelligence; Risk Hedging in the Newsvendor Model; Fuzzy Risk Analysis in Underwater Intelligence System Issues and Advancement in Man/Machine Complex Swarms
  • A New Approach to Identify and Analyze Multi-leveled Risks: Extension of the Fuzzy FMEA MethodEvidential Risk Graph Model for Determining Safety Integrity Level; Variable Domain Eigenvalue Problems with Applications to Some Mechanical Systems; Part III - Networks/IT; Community Networks for Information Sharing; Operating SCADA Systems in Potential Risk Intrusion Network Environment and Risk Management; Continuous Computing Technologies For Mitigating IT-related Business Risks; Network Q-Learning Controls Prevent Cyber Intrusion Risks: Synergies of Control Theory and Computational Intelligence
  • Calibration of Customer Risk Scoring via Classification Techniques for Money Laundering PreventionNeural Network Rule Extraction and Decision Tables for Software Fault Prediction; Subject Index; Author Index;
  • Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities must be built into the network to allow for quick and automatic recovery with little or no interruption or loss. This book contains contributions to the NATO Advanced Research Workshop on The Use of Risk Analysis in Computer-Aided Persuasion held in Antalya, Turkey in May 2011. The goal has been to f

Ämnesord och genrebeteckningar

Biuppslag (personer, institutioner, konferenser, titlar ...)

  • Atiya, A.(författare)

Sammanhörande titlar

  • Annan version:Print:Duman, E.Use of Risk Analysis in Computer-Aided Persuasion20119781607508274

Seriebiuppslag

  • NATO Science for Peace and Security Series E: Human and Societal Dynamics

Hitta via bibliotek

Till lärosätets databas

Hitta mer i SwePub

Av författaren/redakt...
Duman, E.
Atiya, A.
Av lärosätet
Swepub_uni:_t

Sök utanför SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy