Foundations of Cyber Deception Foundations of Cyber Deception
Advances in Information Security

Foundations of Cyber Deception

Modeling, Analysis, Design, Human Factors, and Their Convergence

Quanyan Zhu y otros
    • USD 149.99
    • USD 149.99

Descripción editorial

This book, structured as an edited volume, consists of 12 chapters organized into four key themes: Theoretical Foundations, Human Factors, Application Domains, and Future Challenges. It highlights the dynamic and interdisciplinary nature of cyber deception research, offering insights into diverse application areas such as industrial control systems and AI security.

Cyber deception has emerged as a critical strategy for defending digital assets across academia, industry, and government. By creating false information, deceptive environments, or misleading signals, it aims to confuse, delay, or misdirect adversaries while simultaneously gathering intelligence on their tactics. This proactive approach shifts the traditional information advantage from attackers to defenders, strengthening cybersecurity resilience.

Designed as a foundational resource, this book is particularly valuable for students and early-career researchers seeking to understand cyber deception and identify pressing research challenges. It emphasizes the need for context-aware and adaptive strategies to counter the ever-evolving tactics of cyber adversaries. Furthermore, this book advocates for leveraging emerging technologies and interdisciplinary approaches to advance deception techniques. By addressing both current and future challenges, this volume provides a comprehensive roadmap for enhancing cyber deception strategies and fostering the development of more robust and resilient cybersecurity defences.

GÉNERO
Informática e Internet
PUBLICADO
2026
30 de enero
IDIOMA
EN
Inglés
EXTENSIÓN
322
Páginas
EDITORIAL
Springer Nature Switzerland
VENDEDOR
Springer Nature B.V.
TAMAÑO
20.6
MB
Cybersicherheit in kritischen Infrastrukturen Cybersicherheit in kritischen Infrastrukturen
2025
Decision and Game Theory for Security Decision and Game Theory for Security
2024
Cognitive Security Cognitive Security
2023
Cyber-Security Threats and Response Models in Nuclear Power Plants Cyber-Security Threats and Response Models in Nuclear Power Plants
2022
IoT Supply Chain Security Risk Analysis and Mitigation IoT Supply Chain Security Risk Analysis and Mitigation
2022
Security and Resilience of Control Systems Security and Resilience of Control Systems
2022
Cybersecurity for Network and Information Security Cybersecurity for Network and Information Security
2026
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024
Decision Making and Security Risk Management for IoT Environments Decision Making and Security Risk Management for IoT Environments
2024