Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Intelligent methods for cyber warfare
Yager R., Reformat M., Alajlan N., Springer Publishing Company, Incorporated, Cham, Switzerland, 2014. 278 pp. Type: Book (978-3-319086-23-1)
Date Reviewed: Jan 28 2015

This collection of papers describes current work in the cyber security area. It contains 12 academic papers, with detailed mathematical explanations of the algorithms offered. It is recommended reading for its narrow target audience, an academic community with prior knowledge of the esoterica of machine learning and cyber warfare. A wider audience would find that it assumes too much prior knowledge; the poor grammar can also be distracting.

Machine learning applied to cyber security is a relatively new field. It was discussed in detail in a 2009 book [1], and was also covered at the 2013 IEEE International Conference on Technologies for Homeland Security (HST).

This work suffers from a lack of attention to detail in editing, specifically inadequate proofreading. The eighth paper by Kumar and Kumar is notable in this context. It has instances of overly long sentences, with clauses that differ in voice and tense. Number disagreement between subject and verb is frequent enough to be distracting to the reader. There are also occurrences of correctly spelled but still incorrect words.

The eleventh paper, by Holsopple et al., on the other hand, is an excellent example of what a paper should be. Its English is impeccable, and important terms are defined early in the paper to aid understanding.

At less than 300 pages, the book is of sufficient length to cover the material presented. The academic convention of referencing is followed throughout. Illustrations are sufficient in number, generally clear, and relevant to the context. There is no index.

In summary, the 12 papers are mixed in quality. Some introduce new methods, while some discuss existing work. Some show evidence of thorough proofreading, while some do not. If you have a background and interest in the subject matter, then this book may be a worthwhile addition to your bookshelf.

Reviewer:  Neil D. Burgess Review #: CR143119 (1505-0390)
1) Tsai, J. J. P.; Yu, P. S. Machine learning in cyber trust: security, privacy, and reliability. Springer, New York, NY, 2009.
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (K.6.5 )
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy