Skip to main content
  • Book
  • © 2014

Cybersecurity Systems for Human Cognition Augmentation

  • Covers the latest research tools and applications from government, industry, and academic situations
  • Clarifies the complexities of neuromorphic computing and machine learning as applied to network security
  • Summarizes new technologies related to cybersecurity
  • Includes supplementary material: sn.pub/extras

Part of the book series: Advances in Information Security (ADIS, volume 61)

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (13 chapters)

  1. Front Matter

    Pages i-xvi
  2. Neuromorphic Computing for Cognitive Augmentation in Cyber Defense

    • Robinson E. Pino, Alexander Kott
    Pages 19-45
  3. Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance

    • Massimiliano Albanese, Hasan Cam, Sushil Jajodia
    Pages 47-60
  4. Data Mining in Cyber Operations

    • Misty Blowers, Stefan Fernandez, Brandon Froberg, Jonathan Williams, George Corbin, Kevin Nelson
    Pages 61-73
  5. Dynamic Logic Machine Learning for Cybersecurity

    • Leonid Perlovsky, Olexander Shevchenko
    Pages 85-98
  6. Towards Neural Network Based Malware Detection on Android Mobile Devices

    • Wei Yu, Linqiang Ge, Guobin Xu, Xinwen Fu
    Pages 99-117
  7. Memristors as Synapses in Artificial Neural Networks: Biomimicry Beyond Weight Change

    • Andrew J. Lohn, Patrick R. Mickel, James B. Aimone, Erik P. Debenedictis, Matthew J. Marinella
    Pages 135-150
  8. Low Power Neuromorphic Architectures to Enable Pervasive Deployment of Intrusion Detection Systems

    • Tarek M. Taha, Raqibul Hasan, Chris Yakopcic, Mark R. McLean
    Pages 151-168
  9. Memristor SPICE Model Simulation and Device Hardware Correlation

    • Robinson E. Pino, Antonio S. Oblea, Kristy A. Campbell
    Pages 169-174
  10. Reconfigurable Memristor Based Computing Logic

    • Robinson E. Pino, Youngok K. Pino
    Pages 175-182
  11. Cyber Security Considerations for Reconfigurable Systems

    • James Lyke, Arthur Edwards
    Pages 183-209

About this book

This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.

Editors and Affiliations

  • ICF International, Fairfax, USA

    Robinson E. Pino

  • Army Research Laboratory, Adelphi, USA

    Alexander Kott

  • ICF International, Darlington, USA

    Michael Shevenell

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access