Cyber Deception Cyber Deception
Advances in Information Security

Cyber Deception

Techniques, Strategies, and Human Aspects

Tiffany Bao und andere
    • 129,99 €
    • 129,99 €

Beschreibung des Verlags

This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. 
This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception:  Understanding human’s cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human’s behaviorsDesigning deceptive techniques that supports the enforcement of deceptive strategies
The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception.
Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity.
Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

GENRE
Computer und Internet
ERSCHIENEN
2023
8. März
SPRACHE
EN
Englisch
UMFANG
259
Seiten
VERLAG
Springer International Publishing
ANBIETERINFO
Springer Science & Business Media LLC
GRÖSSE
19,3
 MB
Adaptive Autonomous Secure Cyber Systems Adaptive Autonomous Secure Cyber Systems
2020
Adversary-Aware Learning Techniques and Trends in Cybersecurity Adversary-Aware Learning Techniques and Trends in Cybersecurity
2021
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2019
ICT Systems Security and Privacy Protection ICT Systems Security and Privacy Protection
2018
Computer Security – ESORICS 2021 Computer Security – ESORICS 2021
2021
Security and Artificial Intelligence Security and Artificial Intelligence
2022
Preserving Privacy in Data Outsourcing Preserving Privacy in Data Outsourcing
2010
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024
Decision Making and Security Risk Management for IoT Environments Decision Making and Security Risk Management for IoT Environments
2024