Cover image for Use of Risk Analysis in Computer-Aided Persuasion.
Use of Risk Analysis in Computer-Aided Persuasion.
Title:
Use of Risk Analysis in Computer-Aided Persuasion.
Author:
Duman, E.
ISBN:
9781607508281
Personal Author:
Physical Description:
1 online resource (348 pages)
Series:
NATO Science for Peace and Security Series E: Human and Societal Dynamics
Contents:
USE OF RISK ANALYSIS IN COMPUTER-AIDEDPERSUASION -- Preface -- Contents -- Part I - Fraud and Financial -- A Framework for Modeling Network Risk -- Centrality Measures in Shareholding Networks -- Concealed Investment Strategy Threats -- Asset Management System: Risk Analysis in Portfolio Selection using Fuzzy Logic -- Using Social Networks for On-line Credit Card Fraud Analysis -- Linear and Nonlinear Kernel Based Pattern Recognition: From Theory to Financial Practice -- A Comparison of Classification Models on Credit Card Fraud Detection with respect to Cost-Based Performance Metrics -- Part II - Threats to Security/Economic Entities -- Protecting from Intelligent Threats: Exposure of the Latest Developments in Defense -Attack Strategies -- Automated Detection of Terrorist Web Documents using Fuzzy Lexicons with Fuzzy-based Clustering Methodology -- A Stratified Environment of Intelligent Early Warning Agents for the General Problem of Asymmetric Threats -- Role of Information Security in Intelligence -- Risk Hedging in the Newsvendor Model -- Fuzzy Risk Analysis in Underwater Intelligence System Issues and Advancement in Man/Machine Complex Swarms -- A New Approach to Identify and Analyze Multi-leveled Risks: Extension of the Fuzzy FMEA Method -- Evidential Risk Graph Model for Determining Safety Integrity Level -- Variable Domain Eigenvalue Problems with Applications to Some Mechanical Systems -- Part III - Networks/IT -- Community Networks for Information Sharing -- Operating SCADA Systems in Potential Risk Intrusion Network Environment and Risk Management -- Continuous Computing Technologies For Mitigating IT-related Business Risks -- Network Q-Learning Controls Prevent Cyber Intrusion Risks: Synergies of Control Theory and Computational Intelligence.

Calibration of Customer Risk Scoring via Classification Techniques for Money Laundering Prevention -- Neural Network Rule Extraction and Decision Tables for Software Fault Prediction -- Subject Index -- Author Index.
Abstract:
Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities must be built into the network to allow for quick and automatic recovery with little or no interruption or loss. This book contains contributions to the NATO Advanced Research Workshop on The Use of Risk Analysis in Computer-Aided Persuasion held in Antalya, Turkey in May 2011. The goal has been to further the research and knowledge in the areas of combating threats and risks to entities, systems and networks. The papers presented here fall into three categories. The first deals with fraud and financial systems. The second one considers threats to security and economic entities. The third group of papers considers computer network, IT and software threats. Cutting edge methods based on neural networks, social network analytics, Bayesian networks, decision trees and risk hedging have been proposed in these works to deal with these challenging problems.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: