Cyber Deception Techniques Strategies and Human Aspects 1st edition by Tiffany Bao,Milind Tambe,Cliff Wang – Ebook PDF Instant Download/Delivery.9783031166136,3031166132
Full download Cyber Deception Techniques Strategies and Human Aspects 1st edition after payment
Product details:
ISBN 10:3031166132
ISBN 13:9783031166136
Author:Tiffany Bao,Milind Tambe,Cliff Wang
This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: Understanding human’s cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human’s behaviors Designing deceptive techniques that supports the enforcement of deceptive strategies The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception. Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity. Chapter ‘Using Amnesia to Detect Credential Database Breaches’ and Chapter ‘Deceiving ML-Based Friend-or-Foe Identification for Executables’ are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Cyber Deception Techniques Strategies and Human Aspects 1st Table of contents:
Diversifying Deception: Game-Theoretic Models for Two-Sided Deception and Initial Human Studies
Human-Subject Experiments on Risk-Based Cyber Camouflage Games
Adaptive Cyberdefense with Deception: A Human–AI Cognitive Approach
Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception
Deceptive Signaling: Understanding Human Behavior Against Signaling Algorithms
Optimizing Honey Traffic Using Game Theory and Adversarial Learning
Mee: Adaptive Honeyfile System for Insider Attacker Detection
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
Using Amnesia to Detect Credential Database Breaches
Deceiving ML-Based Friend-or-Foe Identification for Executables
People also search for Cyber Deception Techniques Strategies and Human Aspects 1st:
cyber deception meaning
cyber deception techniques strategies and human aspects
what is deception in cyber security
deception techniques in cyber security
cyber deception technology