1 Describes the latest work on the attribution problem to help identify culprits of cyber-attacks 2 Describes how a variety of subfields of computer science are applied to cyber-security including artificial intelligence, game theory, programming languages, and graph theory 3 Fully referenced4 Features chapters by leading scientists in the field
Read More
1 Describes the latest work on the attribution problem to help identify culprits of cyber-attacks 2 Describes how a variety of subfields of computer science are applied to cyber-security including artificial intelligence, game theory, programming languages, and graph theory 3 Fully referenced4 Features chapters by leading scientists in the field
Read Less