img Leseprobe Leseprobe

Cyber Deception

Techniques, Strategies, and Human Aspects

Cliff Wang (Hrsg.), Milind Tambe (Hrsg.), Tiffany Bao (Hrsg.)

PDF
ca. 149,79
Amazon iTunes Thalia.de Weltbild.de Hugendubel Bücher.de ebook.de kobo Osiander Google Books Barnes&Noble bol.com Legimi yourbook.shop Kulturkaufhaus ebooks-center.de
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

Springer International Publishing img Link Publisher

Naturwissenschaften, Medizin, Informatik, Technik / Informatik

Beschreibung

This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. 

This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: 
 
  • Understanding human’s cognitive behaviors in decoyed network scenarios 
  • Developing effective deceptive strategies based on human’s behaviors
  • Designing deceptive techniques that supports the enforcement of deceptive strategies

The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception.

Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity.

Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Weitere Titel in dieser Kategorie
Cover Cyber Operations
Jerry M. Couretas
Cover Cyber Operations
Jerry M. Couretas

Kundenbewertungen

Schlagwörter

Cyber deception, Uncertainty, Dynamic decision making, instance-based learning, HackIT, Honeypots, Human/Computer Interactions, HoneyPLC, Asymmetric game, Security, knowledge tracing, Game theory, human cognition, ACT-R, Cognitive model, Cybersecurity, reconnaissance, Honeyflow, Network security