{"title":"Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network","authors":"Ruan Jianfei, Zheng Yan, Bo Dong, Q. Zheng","doi":"10.1201/9780429504044-12","DOIUrl":"https://doi.org/10.1201/9780429504044-12","url":null,"abstract":"","PeriodicalId":250728,"journal":{"name":"Machine Learning for Computer and Cyber Security","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121887567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Siyakha N. Mthunzi, E. Benkhelifa, Tomasz Bosakowski, S. Hariri
{"title":"A Bio-inspired Approach To Cyber Security","authors":"Siyakha N. Mthunzi, E. Benkhelifa, Tomasz Bosakowski, S. Hariri","doi":"10.1201/9780429504044-4","DOIUrl":"https://doi.org/10.1201/9780429504044-4","url":null,"abstract":"Owing to a growing reliance on information, technology and connectivity, Cyberspace has become the lifeline and interactive place for modern life. As such, Cyber security challenges are a global phenomenon whose adverse implications are catastrophic. Cyberspace is complex and unpredictable; its global connectedness and an explosion of data increases the threat surface as cyber infrastructures become highly complex and dynamic. Managing, i.e. ensuring and assuring security in cyberspace requires inspiration from advanced complex systems. Through evolution, nature has developed natural propensities in complex systems (including animalia and plants) that enable survival through adaptation. Predation-avoidance and anti-predation techniques employed by non-extinct preys could be exploited/adopted as mechanisms for adaptation through their application in Cyber security. This chapter presents an overall review of the current state of the Cyber security landscape. In addition, it demonstrates through further review, significant trends towards bio-inspired approaches as unconventional solutions to problems in other fields. Drawing from survivable preys in nature, the chapter speculates solutions for Cyberspace and Cyber security as follows; given an old problem (Pold) with an old solutions (Sold), a new problem (Pnew) can be conceptualized with new partial and perhaps null solutions (Snew) in the solutions space Sold to Snew. \u0000Keywords: Bio-inspired, Artificial Life, Cyber security, Cyberdefense, Autonomic Computing, Survivability, Cloud Computing, Machine Learning, Predator-Prey.","PeriodicalId":250728,"journal":{"name":"Machine Learning for Computer and Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132932868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teaching Johnny to thwart phishing attacks","authors":"N. Arachchilage, M. A. Hameed","doi":"10.1201/9780429504044-15","DOIUrl":"https://doi.org/10.1201/9780429504044-15","url":null,"abstract":"","PeriodicalId":250728,"journal":{"name":"Machine Learning for Computer and Cyber Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125311715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Taxonomy of Bitcoin Security Issues and Defense Mechanisms","authors":"Prachi Gulihar, B. Gupta","doi":"10.1201/9780429504044-9","DOIUrl":"https://doi.org/10.1201/9780429504044-9","url":null,"abstract":"","PeriodicalId":250728,"journal":{"name":"Machine Learning for Computer and Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125102832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Alloghani, T. Baker, D. Al-Jumeily, A. Hussain, A. Aljaaf, J. Mustafina
{"title":"Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture","authors":"M. Alloghani, T. Baker, D. Al-Jumeily, A. Hussain, A. Aljaaf, J. Mustafina","doi":"10.1201/9780429504044-10","DOIUrl":"https://doi.org/10.1201/9780429504044-10","url":null,"abstract":"","PeriodicalId":250728,"journal":{"name":"Machine Learning for Computer and Cyber Security","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121929350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ammar Almomani, Mohammed Alweshah, Saleh Al Khalayleh, M. Al-Refai, R. Qashi
{"title":"Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection","authors":"Ammar Almomani, Mohammed Alweshah, Saleh Al Khalayleh, M. Al-Refai, R. Qashi","doi":"10.1201/9780429504044-8","DOIUrl":"https://doi.org/10.1201/9780429504044-8","url":null,"abstract":"","PeriodicalId":250728,"journal":{"name":"Machine Learning for Computer and Cyber Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122938344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Vinayakumar, K. Soman, P. Poornachandran, V. Menon
{"title":"A Deep-dive on Machine Learning for Cyber Security Use Cases","authors":"R. Vinayakumar, K. Soman, P. Poornachandran, V. Menon","doi":"10.1201/9780429504044-6","DOIUrl":"https://doi.org/10.1201/9780429504044-6","url":null,"abstract":"","PeriodicalId":250728,"journal":{"name":"Machine Learning for Computer and Cyber Security","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133464131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Importance of providing Incentives and economic Solutions in It Security","authors":"Amrita Dahiya, B. Gupta","doi":"10.1201/9780429504044-14","DOIUrl":"https://doi.org/10.1201/9780429504044-14","url":null,"abstract":"","PeriodicalId":250728,"journal":{"name":"Machine Learning for Computer and Cyber Security","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124790318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of a Model to Evaluate and Utilize Users’ Interactions in Online Social Networks","authors":"I. Alsmadi, Muhammad Al-Abdullah","doi":"10.1201/9780429504044-5","DOIUrl":"https://doi.org/10.1201/9780429504044-5","url":null,"abstract":"","PeriodicalId":250728,"journal":{"name":"Machine Learning for Computer and Cyber Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127898782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}