logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Cyber Deception: Techniques, Strategies, and Human Aspects by Tiffany Bao, Milind Tambe, Cliff Wang (Editors) ISBN 9783031166129, 9783031166136, 3031166124, 3031166132

  • SKU: EBN-48119548
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

0.0

0 reviews
Instant download (eBook) Cyber Deception: Techniques, Strategies, and Human Aspects after payment.
Authors:Tiffany Bao, Milind Tambe, Cliff Wang (Editors)
Pages:252 pages.
Year:2023
Editon:1
Publisher:Springer, Springer Nature Switzerland AG
Language:english
File Size:6.17 MB
Format:pdf
ISBNS:9783031166129, 9783031166136, 3031166124, 3031166132
Categories: Ebooks

Product desciption

(Ebook) Cyber Deception: Techniques, Strategies, and Human Aspects by Tiffany Bao, Milind Tambe, Cliff Wang (Editors) ISBN 9783031166129, 9783031166136, 3031166124, 3031166132

This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception:  Understanding human’s cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human’s behaviorsDesigning deceptive techniques that supports the enforcement of deceptive strategiesThe research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception.Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity.Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products