logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Game Theory For Cyber Deception From Theory To Applications 1st Edition Jeffrey Pawlick

  • SKU: BELL-34773796
Game Theory For Cyber Deception From Theory To Applications 1st Edition Jeffrey Pawlick
$ 31.00 $ 45.00 (-31%)

5.0

108 reviews

Game Theory For Cyber Deception From Theory To Applications 1st Edition Jeffrey Pawlick instant download after payment.

Publisher: Birkhäuser
File Extension: PDF
File size: 5.14 MB
Pages: 203
Author: Jeffrey Pawlick, Quanyan Zhu
ISBN: 9783030660642, 3030660648
Language: English
Year: 2021
Edition: 1

Product desciption

Game Theory For Cyber Deception From Theory To Applications 1st Edition Jeffrey Pawlick by Jeffrey Pawlick, Quanyan Zhu 9783030660642, 3030660648 instant download after payment.

This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field.

The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception.

Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.

Related Products