Cyber Deception [E-Book] : Techniques, Strategies, and Human Aspects / edited by Tiffany Bao, Milind Tambe, Cliff Wang.
This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide vari...
Saved in:
Full text |
|
Personal Name(s): | Bao, Tiffany, editor |
Tambe, Milind, editor / Wang, Cliff, editor | |
Edition: |
1st edition 2023. |
Imprint: |
Cham :
Springer,
2023
|
Physical Description: |
X, 249 pages 62 illustrations, 51 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783031166136 |
DOI: |
10.1007/978-3-031-16613-6 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Advances in Information Security ;
89 |
Subject (LOC): |
LEADER | 03672nam a22004335i 4500 | ||
---|---|---|---|
001 | 978-3-031-16613-6 | ||
003 | Springer | ||
008 | 230308s2023 sz | s |||| 0|eng d | ||
020 | |a 9783031166136 | ||
024 | 7 | |a 10.1007/978-3-031-16613-6 |2 doi | |
035 | |a (Sirsi) a873363 | ||
041 | |a eng | ||
082 | 0 | 4 | |a 005.8 |2 23 |
245 | 1 | 0 | |a Cyber Deception |h [E-Book] : |b Techniques, Strategies, and Human Aspects / |c edited by Tiffany Bao, Milind Tambe, Cliff Wang. |
250 | |a 1st edition 2023. | ||
264 | 1 | |a Cham : |b Springer, |c 2023 |e (Springer LINK) |f SpringerComputerScience20230712 | |
300 | |a X, 249 pages 62 illustrations, 51 illustrations in color (online resource) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | |a Advances in Information Security ; |v 89 | ||
500 | |a englisch | ||
505 | 0 | |a 1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception -- 2. Human-Subject Experiments on Risk-based Cyber Camouflage Games -- 3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- 4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- 5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- 6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- 7. Mee: Adaptive Honeyfile System for Insider Attacker Detection -- 8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- 9. Using Amnesia to Detect Credential Database Breaches -- 10. Deceiving ML-Based Friend-or-Foe Identification for Executables. | |
520 | |a This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: Understanding human's cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human's behaviors Designing deceptive techniques that supports the enforcement of deceptive strategies The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception. Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity. Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Data protection. | |
650 | 0 | |a Human-computer interaction. | |
650 | 0 | |a Machine learning. | |
650 | 0 | |a User interfaces (Computer systems). | |
700 | 1 | |a Bao, Tiffany, |e editor | |
700 | 1 | |a Tambe, Milind, |e editor | |
700 | 1 | |a Wang, Cliff, |e editor | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-031-16613-6 |z Volltext |
915 | |a zzwFZJ3 | ||
932 | |a Computer Science (R0) (SpringerNature-43710) | ||
932 | |a Computer Science (SpringerNature-11645) | ||
596 | |a 1 | ||
949 | |a XX(873363.1) |w AUTO |c 1 |i 873363-1001 |l ELECTRONIC |m ZB |r N |s Y |t E-BOOK |u 12/7/2023 |x ZB-D |z UNKNOWN |0 NEL |1 ONLINE |