Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyber deception = techniques, strate...
~
Bao, Tiffany.
Linked to FindBook
Google Book
Amazon
博客來
Cyber deception = techniques, strategies, and human aspects /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cyber deception/ edited by Tiffany Bao, Milind Tambe, Cliff Wang.
Reminder of title:
techniques, strategies, and human aspects /
other author:
Bao, Tiffany.
Published:
Cham :Springer International Publishing : : 2023.,
Description:
x, 249 p. :ill., digital ;24 cm.
[NT 15003449]:
1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception -- 2. Human-Subject Experiments on Risk-based Cyber Camouflage Games -- 3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- 4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- 5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- 6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- 7. Mee: Adaptive Honeyfile System for Insider Attacker Detection -- 8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- 9. Using Amnesia to Detect Credential Database Breaches -- 10. Deceiving ML-Based Friend-or-Foe Identification for Executables.
Contained By:
Springer Nature eBook
Subject:
Computer networks - Security measures. -
Online resource:
https://doi.org/10.1007/978-3-031-16613-6
ISBN:
9783031166136
Cyber deception = techniques, strategies, and human aspects /
Cyber deception
techniques, strategies, and human aspects /[electronic resource] :edited by Tiffany Bao, Milind Tambe, Cliff Wang. - Cham :Springer International Publishing :2023. - x, 249 p. :ill., digital ;24 cm. - Advances in information security,v. 892512-2193 ;. - Advances in information security ;v. 89..
1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception -- 2. Human-Subject Experiments on Risk-based Cyber Camouflage Games -- 3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- 4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- 5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- 6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- 7. Mee: Adaptive Honeyfile System for Insider Attacker Detection -- 8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- 9. Using Amnesia to Detect Credential Database Breaches -- 10. Deceiving ML-Based Friend-or-Foe Identification for Executables.
This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: Understanding human's cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human's behaviors Designing deceptive techniques that supports the enforcement of deceptive strategies The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception. Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity. Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
ISBN: 9783031166136
Standard No.: 10.1007/978-3-031-16613-6doiSubjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Cyber deception = techniques, strategies, and human aspects /
LDR
:03222nmm a2200361 a 4500
001
2316929
003
DE-He213
005
20230308103303.0
006
m d
007
cr nn 008maaau
008
230902s2023 sz s 0 eng d
020
$a
9783031166136
$q
(electronic bk.)
020
$a
9783031166129
$q
(paper)
024
7
$a
10.1007/978-3-031-16613-6
$2
doi
035
$a
978-3-031-16613-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.C994 2023
245
0 0
$a
Cyber deception
$h
[electronic resource] :
$b
techniques, strategies, and human aspects /
$c
edited by Tiffany Bao, Milind Tambe, Cliff Wang.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2023.
300
$a
x, 249 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in information security,
$x
2512-2193 ;
$v
v. 89
505
0
$a
1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception -- 2. Human-Subject Experiments on Risk-based Cyber Camouflage Games -- 3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- 4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- 5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- 6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- 7. Mee: Adaptive Honeyfile System for Insider Attacker Detection -- 8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- 9. Using Amnesia to Detect Credential Database Breaches -- 10. Deceiving ML-Based Friend-or-Foe Identification for Executables.
520
$a
This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: Understanding human's cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human's behaviors Designing deceptive techniques that supports the enforcement of deceptive strategies The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception. Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity. Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Cyberspace
$x
Security measures.
$3
1361665
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
User Interfaces and Human Computer Interaction.
$3
892554
650
2 4
$a
Machine Learning.
$3
3382522
650
2 4
$a
Principles and Models of Security.
$3
3382356
700
1
$a
Bao, Tiffany.
$3
3630542
700
1
$a
Tambe, Milind.
$3
1070080
700
1
$a
Wang, Cliff.
$3
898853
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Advances in information security ;
$v
v. 89.
$3
3630543
856
4 0
$u
https://doi.org/10.1007/978-3-031-16613-6
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9453179
電子資源
11.線上閱覽_V
電子書
EB TK5105.59
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login