Skip to main content

2016 | OriginalPaper | Buchkapitel

13. Self-Awareness

verfasst von : Yang Cai

Erschienen in: Instinctive Computing

Verlag: Springer London

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

According to ethnologists, humans are simply survival machines programmed to preserve and replicate our genes. In order to secure this process, we have developed self-awareness to identify ourselves and to avoid life-threatening situations at multiple levels, from our cells to our existence as organisms. In this Chapter, we explore self-defense systems in nature and cyberspace, the behavioral models of malicious programs, biomorphic defense models, and collective consciousness in the Internet of Things.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Dawkins R (1976) The selfish gene. Oxford University Press.
 
3
Gregory RL and Gombrich EH, eds. (1973) Illusion in nature and art. Charles Scribner’s Sons, New York.
 
4
Hawking S. Life in the universe. hawking.org.uk. http://​www.​hawking.​org.​uk/​life-in-the-universe.​html
 
6
Toon J (2011) How T cell recognize the bad guys. Futurity, Jan. 24, 2011. http://​www.​futurity.​org/​how-t-cells-recognize-the-bad-guys/​
 
7
Jian N, Huang J, Edward LJ, Liu B, Zhang Y, Beal CD, Evavold BD, Zhu C (2011) Two-stage cooperative T cell receptor-peptide major histocompatibility complex-CD8 trimolecular interactions amplify antigen discrimination, Journal of Immunity, vol. 34, No. 1, p13–23, January 2011.
 
8
Forrest S and Perelson AS (1994) Self-nonself discrimination in a computer. Proceedings of IEEE Computer Society on Research on Security and Privacy, 1994.
 
9
Dasgupta D and Forrest S (1998) An anomaly detection algorithm inspired by the immune system. In Dasgupta D. (ed.). Artificial Immune Systems and Their Applications. Springer.
 
10
Forrest S, Javornik B, Smith R and Perelson AS (1993) Using genetic algorithms to explore pattern recognition in the immune system. Evolutionary Computation, vol.1, no. 3, pp.191–211, 1993
 
11
Dasgupta D. An overview of artificial immune systems and their applications. In Dasgupta D, eds. (1998) Artificial Immune Systems and Their Applications. Springer 1998
 
12
Christopher D. Lynn et al. (2016) Tattooing to “Toughen up”: Tattoo experience and secretory immunoglobulin A, American Journal of Human Biology. March 4, 2016.
 
13
University of Alabama in Tuscaloosa (2016) Want to avoid a cold? Try a tattoo or twenty, says researcher. Medical Press. Online post on March 9, 2016. http://​medicalxpress.​com/​news/​2016-03-cold-tattoo-twenty.​html
 
14
Gallup GG, Anderson JR, and Shillito DJ (2002) The mirror test. In Bekoff B et al. (eds). The Cognitive Animal. The MIT Press, 2002.
 
15
CycleFish.com. What gives a Harley-Davidson its unique sound? Posted on August 4, 2011. http://​www.​cyclefish.​com/​RoadCaptain/​blog/​1311/​
 
16
McGehee F (1937) The reliability of the identification of human voice. J. of Psychology, vol. 17, pp. 249–271, 1937.
 
18
Atal BS (1976) Automatic recognition of speakers from their voices. Proceedings of IEEE, vol. 64, no. 4 April, 1976
 
19
Cai Y, Li X, Gong ZJ, Codina TR (2014) Speaker verification for multi-task interactions. Journal of Interacting with Computer, vol. 26, no. 2, pp. 135–144, 2014
 
20
Maxion R (2012) Making experiments dependable. The Next Wave. Vol. 19, no. 2, 2012
 
21
Rossmo DK (1999) Geographical profiling. CRC Press.
 
23
Kastrenakes J (2014) Google develops computer vision accurate enough to solve its own CAPTCHAs. The Verge on April 16, 2014: http://​www.​theverge.​com/​2014/​4/​16/​5621538/​google-algorithm-can-solve-recaptcha-almost-every-time
 
24
Britannica.com. Computer virus – Encyclopedia Britannica. Retrieved 28 April 2013.
 
26
Morales J (2013) Prioritizing malware analysis. SEI Blog. November 4, 2013. https://​insights.​sei.​cmu.​edu/​sei_​blog/​2013/​11/​prioritizing-malware-analysis.​html
 
27
Morales JA, Clarke PJ and Deng Y (2010) Identification of file infecting viruses through detection of self-reference replication. Journal of Computer Virology, vol. 6, pp. 161–180, 2010
 
28
Malan DJ and Smith MD (2005) Host-based detection of worms through peer-to-peer cooperation. WORM’05 Proceedings of the 2005 ACM workshop on Rapid Malcode, pp. 72–80, 2005.
 
29
Morales JA, Main M, Luo W, Xu S, and Sandhu R (2011) Building malware infection trees. The 6th International Conference on Malicious and Unwanted Software (MALWARE), IEEE Xplore:27 Dec 2011.
 
30
Petri CA (1962) Dissertation: Kommunikation mit Automaten, Institut für Instrumentelle Mathematik, Bonn, 1962.
 
31
Tischer M, Durumeric Z, Foster S and Duan S (2016) Users really do plug in USB drives they found. Proceedings of 37th IEEE Symposium of Security and Privacy, San Jose, May 2016.
 
32
Falliere N, Murchu LO and Chien E (2011) W32.Stuxnet Dossier. Version 1.4. Feb. 2011. Online document from Symantec.
 
34
Brand S (1988) The media lab. Penguin Books, Inc.
 
35
Ginsberg J. et al. (2009) Detecting influenza epidemics using search engine query data. Nature, vol. 457, pp. 1012–1014.
 
36
Crossbow 2005). Wireless sensor networks seminar, San Jose, April 19–20, 2005.
 
Metadaten
Titel
Self-Awareness
verfasst von
Yang Cai
Copyright-Jahr
2016
Verlag
Springer London
DOI
https://doi.org/10.1007/978-1-4471-7278-9_13