Cyber Deception Cyber Deception
Advances in Information Security

Cyber Deception

Techniques, Strategies, and Human Aspects

Tiffany Bao and Others
    • $139.99
    • $139.99

Publisher Description

This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. 
This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception:  Understanding human’s cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human’s behaviorsDesigning deceptive techniques that supports the enforcement of deceptive strategies
The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception.
Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity.
Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

GENRE
Computers & Internet
RELEASED
2023
March 8
LANGUAGE
EN
English
LENGTH
259
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
19.3
MB
Adaptive Autonomous Secure Cyber Systems Adaptive Autonomous Secure Cyber Systems
2020
Adversary-Aware Learning Techniques and Trends in Cybersecurity Adversary-Aware Learning Techniques and Trends in Cybersecurity
2021
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2019
ICT Systems Security and Privacy Protection ICT Systems Security and Privacy Protection
2018
Computer Security – ESORICS 2021 Computer Security – ESORICS 2021
2021
Security and Artificial Intelligence Security and Artificial Intelligence
2022
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007