|Listed in category:
Have one to sell?

Game Theory and Machine Learning for Cyber Security, Hardcover by Kamhoua, Ch...

Great Book Prices Store
(340723)
Registered as a business seller
US $131.98
Approximately£98.11
Condition:
New
3 available
Breathe easy. Returns accepted.
Postage:
Free USPS Media MailTM.
Located in: Jessup, Maryland, United States
Delivery:
Estimated between Fri, 22 Aug and Fri, 29 Aug to 94104
Estimated delivery dates - opens in a new window or tab reflect seller's dispatch time, origin postcode, destination postcode and time of order receipt, and will depend on the delivery service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods, and are an estimate only.
Returns:
14 days return. Buyer pays for return postage. If you use an eBay delivery label, it will be deducted from your refund amount.
Payments:
    Diners Club

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:357282873305
Last updated on 30 Jul, 2025 17:27:59 BSTView all revisionsView all revisions

Item specifics

Condition
New: A new, unread, unused book in perfect condition with no missing or damaged pages. See the ...
Book Title
Game Theory and Machine Learning for Cyber Security
ISBN
9781119723929

About this product

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
1119723922
ISBN-13
9781119723929
eBay Product ID (ePID)
15050089280

Product Key Features

Number of Pages
544 Pages
Publication Name
Game Theory and Machine Learning for Cyber Security
Language
English
Publication Year
2021
Subject
General, Telecommunications
Type
Textbook
Author
Christopher D. Kiekintveld
Subject Area
Mathematics, Technology & Engineering
Format
Hardcover

Dimensions

Item Height
0.4 in
Item Weight
16 Oz
Item Length
0.4 in
Item Width
0.4 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
2021-031984
Dewey Edition
23
Dewey Decimal
005.8
Table Of Content
Editor biographies Contributors Foreword Preface Chapter 1: Introduction Christopher D. Kiekintveld, Charles A. Kamhoua, Fei Fang, Quanyan Zhu Part 1: Game Theory for Cyber Deception Chapter 2: Introduction to Game Theory Fei Fang, Shutian Liu, Anjon Basak, Quanyan Zhu, Christopher Kiekintveld, Charles A. Kamhoua Chapter 3: Scalable Algorithms for Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception Anjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld Chapter 4: Honeypot Allocation Game over Attack Graphs for Cyber Deception Ahmed H. Anwar, Charles Kamhoua, Nandi Leslie, Christopher Kiekintveld Chapter 5: Evaluating Adaptive Deception Strategies for Cyber Defense with Human Experimentation Palvi Aggarwal, Marcus Gutierrez, Christopher Kiekintveld, Branislav Bosansky, Cleotilde Gonzalez Chapter 6: A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception Jie Fu, Abhishek N. Kulkarni Part 2: Game Theory for Cyber Security Chapter 7: Minimax Detection (MAD) for Computer Security: A Dynamic Program Characterization Muhammed O. Sayin, Dinuka Sahabandu, Muhammad Aneeq uz Zaman, Radha Poovendran, Tamer Basar Chapter 8: Sensor Manipulation Games in Cyber Security João P. Hespanha Chapter 9: Adversarial Gaussian Process Regression in Sensor Networks Yi Li, Xenofon Koutsoukos, Yevgeniy Vorobeychik Chapter 10: Moving Target Defense Games for Cyber Security: Theory and Applications Abdelrahman Eldosouky, Shamik Sengupta Chapter 11: Continuous Authentication Security Games Serkan Saritas, Ezzeldin Shereen, Henrik Sandberg, Gyorgy Dan Chapter 12: Cyber Autonomy in Software Security: Techniques and Tactics Tiffany Bao, Yan Shoshitaishvili Part 3: Adversarial Machine Learning for Cyber Security Chapter 13: A Game Theoretic Perspective on Adversarial Machine Learning and Related Cybersecurity Applications Yan Zhou, Murat Kantarcioglu, Bowei Xi Chapter 14: Adversarial Machine Learning in 5G Communications Security Yalin Sagduyu, Tugba Erpek, Yi Shi Chapter 15: Machine Learning in the Hands of a Malicious Adversary: A Near Future If Not Reality Keywhan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T. Kalbarczyk, Thenkurussi Kesavadas, Ravishankar K. Iyer Chapter 16: Trinity: Trust, Resilience and Interpretability of Machine Learning Models Susmit Jha, Anirban Roy, Brian Jalaian, Gunjan Verma Part 4: Generative Models for Cyber Security Chapter 17: Evading Machine Learning based Network Intrusion Detection Systems with GANs Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Mike Weisman Chapter 18: Concealment Charm (ConcealGAN): Automatic Generation of Steganographic Text using Generative Models to Bypass Censorship Nurpeiis Baimukan, Quanyan Zhu Part 5: Reinforcement Learning for Cyber Security Chapter 19: Manipulating Reinforcement Learning: Stealthy Attacks on Cost Signals Yunhan Huang, Quanyan Zhu Chapter 20: Resource-Aware Intrusion Response based on Deep Reinforcement Learning for Software-Defined Internet-of-Battle-Things Seunghyun Yoon, Jin-Hee Cho, Gaurav Dixit, Ing-Ray Chen Part 6: Other Machine Learning approach to Cyber Security Chapter 21: Smart Internet Probing: Scanning Using Adaptive Machine Learning Armin Sarabi, Kun Jin, Mingyan Liu Chapter 22: Semi-automated Parameterization of a Probabilistic Model using Logistic Regression - A Tutorial Stefan Rass, Sandra König, Stefan Schauer Chapter 23: Resilient Distributed Adaptive Cyber-Defense using Blockchain George Cybenko, Roger A. Hallman Chapter 24: Summary and Future Work Quanyan Zhu, Fei Fang
Synopsis
GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field In Game Theory and Machine Learning for Cyber Security , a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security. Readers will explore the vulnerabilities of traditional machine learning algorithms and how they can be mitigated in an adversarial machine learning approach. The book offers a comprehensive suite of solutions to a broad range of technical issues in applying game theory and machine learning to solve cyber security challenges. Beginning with an introduction to foundational concepts in game theory, machine learning, cyber security, and cyber deception, the editors provide readers with resources that discuss the latest in hypergames, behavioral game theory, adversarial machine learning, generative adversarial networks, and multi-agent reinforcement learning. Readers will also enjoy: A thorough introduction to game theory for cyber deception, including scalable algorithms for identifying stealthy attackers in a game theoretic framework, honeypot allocation over attack graphs, and behavioral games for cyber deception An exploration of game theory for cyber security, including actionable game-theoretic adversarial intervention detection against advanced persistent threats Practical discussions of adversarial machine learning for cyber security, including adversarial machine learning in 5G security and machine learning-driven fault injection in cyber-physical systems In-depth examinations of generative models for cyber security Perfect for researchers, students, and experts in the fields of computer science and engineering, Game Theory and Machine Learning for Cyber Security is also an indispensable resource for industry professionals, military personnel, researchers, faculty, and students with an interest in cyber security.
LC Classification Number
QA76.9.A25

Item description from the seller

Seller business information

I certify that all my selling activities will comply with all EU laws and regulations.
About this seller

Great Book Prices Store

96.7% positive Feedback1.4M items sold

Joined Feb 2017
Usually responds within 24 hours
Registered as a business seller

Detailed seller ratings

Average for the last 12 months
Accurate description
4.9
Reasonable postage cost
5.0
Delivery time
5.0
Communication
4.9

Seller Feedback (386,352)

All ratings
Positive
Neutral
Negative
  • c***m (423)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    AAA+++; Excellent Service; Great Pricing; Fast Delivery-Faster Than Expected to Hawaii using free shipping USPS Ground Mail, Received 06/18; Paperback book in Great Condition as Described ; TLC Packaging; Excellent Seller Communication, Sends updates . Highly Recommended!, Thank you very much!
  • l***1 (1491)- Feedback left by buyer.
    Past year
    Verified purchase
    Great seller; book exactly as described in mint condition sold at a reasonable price; seller shipped item FAST, FREE and with tracking information, a must nowadays; seller shipped in tight, cardboard mailing envelope, which tightly fit over the book, preventing damage in shipment; good communication too; rate seller 10+++++
  • c***t (921)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    The book I bought was reasonably priced and when it arrived it was in the 'Like New' condition specified in the listing. However, when I saw that the seller had not shipped the book after more than 15 days had passed since my order I felt I must write to say that I had actually placed an order with the seller and inquire when it planned to send the book. The brusque reply was that a tracking number was available, but no number HAD been created until I pointed out that I had placed the order.