9783031166129-3031166124-Cyber Deception: Techniques, Strategies, and Human Aspects (Advances in Information Security, 89)

Cyber Deception: Techniques, Strategies, and Human Aspects (Advances in Information Security, 89)

ISBN-13: 9783031166129
ISBN-10: 3031166124
Edition: 2023
Author: Cliff Wang, Milind Tambe, Tiffany Bao
Publication date: 2023
Publisher: Springer
Format: Hardcover 259 pages
FREE US shipping
Buy

From $47.70

Book details

ISBN-13: 9783031166129
ISBN-10: 3031166124
Edition: 2023
Author: Cliff Wang, Milind Tambe, Tiffany Bao
Publication date: 2023
Publisher: Springer
Format: Hardcover 259 pages

Summary

Cyber Deception: Techniques, Strategies, and Human Aspects (Advances in Information Security, 89) (ISBN-13: 9783031166129 and ISBN-10: 3031166124), written by authors Cliff Wang, Milind Tambe, Tiffany Bao, was published by Springer in 2023. With an overall rating of 4.0 stars, it's a notable title among other books. You can easily purchase or rent Cyber Deception: Techniques, Strategies, and Human Aspects (Advances in Information Security, 89) (Hardcover) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects.
This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: Understanding human’s cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human’s behaviors Designing deceptive techniques that supports the enforcement of deceptive strategies
The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception.
Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity.
Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book