語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber deception = techniques, strate...
~
Bao, Tiffany.
FindBook
Google Book
Amazon
博客來
Cyber deception = techniques, strategies, and human aspects /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cyber deception/ edited by Tiffany Bao, Milind Tambe, Cliff Wang.
其他題名:
techniques, strategies, and human aspects /
其他作者:
Bao, Tiffany.
出版者:
Cham :Springer International Publishing : : 2023.,
面頁冊數:
x, 249 p. :ill., digital ;24 cm.
內容註:
1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception -- 2. Human-Subject Experiments on Risk-based Cyber Camouflage Games -- 3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- 4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- 5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- 6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- 7. Mee: Adaptive Honeyfile System for Insider Attacker Detection -- 8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- 9. Using Amnesia to Detect Credential Database Breaches -- 10. Deceiving ML-Based Friend-or-Foe Identification for Executables.
Contained By:
Springer Nature eBook
標題:
Computer networks - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-031-16613-6
ISBN:
9783031166136
Cyber deception = techniques, strategies, and human aspects /
Cyber deception
techniques, strategies, and human aspects /[electronic resource] :edited by Tiffany Bao, Milind Tambe, Cliff Wang. - Cham :Springer International Publishing :2023. - x, 249 p. :ill., digital ;24 cm. - Advances in information security,v. 892512-2193 ;. - Advances in information security ;v. 89..
1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception -- 2. Human-Subject Experiments on Risk-based Cyber Camouflage Games -- 3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- 4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- 5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- 6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- 7. Mee: Adaptive Honeyfile System for Insider Attacker Detection -- 8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- 9. Using Amnesia to Detect Credential Database Breaches -- 10. Deceiving ML-Based Friend-or-Foe Identification for Executables.
This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: Understanding human's cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human's behaviors Designing deceptive techniques that supports the enforcement of deceptive strategies The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception. Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity. Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
ISBN: 9783031166136
Standard No.: 10.1007/978-3-031-16613-6doiSubjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Cyber deception = techniques, strategies, and human aspects /
LDR
:03222nmm a2200361 a 4500
001
2316929
003
DE-He213
005
20230308103303.0
006
m d
007
cr nn 008maaau
008
230902s2023 sz s 0 eng d
020
$a
9783031166136
$q
(electronic bk.)
020
$a
9783031166129
$q
(paper)
024
7
$a
10.1007/978-3-031-16613-6
$2
doi
035
$a
978-3-031-16613-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.C994 2023
245
0 0
$a
Cyber deception
$h
[electronic resource] :
$b
techniques, strategies, and human aspects /
$c
edited by Tiffany Bao, Milind Tambe, Cliff Wang.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2023.
300
$a
x, 249 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in information security,
$x
2512-2193 ;
$v
v. 89
505
0
$a
1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception -- 2. Human-Subject Experiments on Risk-based Cyber Camouflage Games -- 3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- 4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- 5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- 6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- 7. Mee: Adaptive Honeyfile System for Insider Attacker Detection -- 8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- 9. Using Amnesia to Detect Credential Database Breaches -- 10. Deceiving ML-Based Friend-or-Foe Identification for Executables.
520
$a
This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: Understanding human's cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human's behaviors Designing deceptive techniques that supports the enforcement of deceptive strategies The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception. Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity. Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Cyberspace
$x
Security measures.
$3
1361665
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
User Interfaces and Human Computer Interaction.
$3
892554
650
2 4
$a
Machine Learning.
$3
3382522
650
2 4
$a
Principles and Models of Security.
$3
3382356
700
1
$a
Bao, Tiffany.
$3
3630542
700
1
$a
Tambe, Milind.
$3
1070080
700
1
$a
Wang, Cliff.
$3
898853
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Advances in information security ;
$v
v. 89.
$3
3630543
856
4 0
$u
https://doi.org/10.1007/978-3-031-16613-6
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9453179
電子資源
11.線上閱覽_V
電子書
EB TK5105.59
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入