logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Cyber Deception Techniques Strategies And Human Aspects 1st Edition Tiffany Bao

  • SKU: BELL-48119548
Cyber Deception Techniques Strategies And Human Aspects 1st Edition Tiffany Bao
$ 31.00 $ 45.00 (-31%)

4.1

80 reviews

Cyber Deception Techniques Strategies And Human Aspects 1st Edition Tiffany Bao instant download after payment.

Publisher: Springer, Springer Nature Switzerland AG
File Extension: PDF
File size: 6.17 MB
Pages: 252
Author: Tiffany Bao, Milind Tambe, Cliff Wang (Editors)
ISBN: 9783031166129, 9783031166136, 3031166124, 3031166132
Language: English
Year: 2023
Edition: 1
Volume: 89

Product desciption

Cyber Deception Techniques Strategies And Human Aspects 1st Edition Tiffany Bao by Tiffany Bao, Milind Tambe, Cliff Wang (editors) 9783031166129, 9783031166136, 3031166124, 3031166132 instant download after payment.

This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. 

This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception:  

Understanding human’s cognitive behaviors in decoyed network scenarios 

Developing effective deceptive strategies based on human’s behaviors

Designing deceptive techniques that supports the enforcement of deceptive strategies

The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception.

Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity.

Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Related Products