新娘 发表于 2025-3-26 22:32:47

http://reply.papertrans.cn/39/3805/380498/380498_31.png

CONE 发表于 2025-3-27 03:57:58

http://reply.papertrans.cn/39/3805/380498/380498_32.png

CRATE 发表于 2025-3-27 08:56:18

Introductioness of threats to cyberspace has helped spur private and public investment in cyberdefense. Yet in the past 10 years, cyberthreats have not only continued to exist, but have also developed new forms based on the evolution of new technologies. This book can be seen as an attempt to confront that reality.

贞洁 发表于 2025-3-27 12:50:36

http://reply.papertrans.cn/39/3805/380498/380498_34.png

NOVA 发表于 2025-3-27 16:24:48

http://reply.papertrans.cn/39/3805/380498/380498_35.png

cortisol 发表于 2025-3-27 18:35:07

Honey-X a species of crypsis (Sect. .). But in other species of deception, the defender aims to create a specific false belief. This is called mimesis. The present chapter studies static mimesis, or, ., which takes its name from technologies related to honeypots, honeytokens, etc.

Facilities 发表于 2025-3-27 23:06:51

Attacker Engagementorked systems. Against APTs, active defense technologies create and exploit information asymmetry for defenders. If these active defenses are also dynamic, then we have the species of deception that Chap. . calls ..

织物 发表于 2025-3-28 05:22:14

Strategic Trust and dependability. Unfortunately, the dynamic and plug-n-play nature of the IoT makes reputation-based trust systems insufficient. Hence, this chapter develops a framework for predictive or strategic trust in which agents make decisions in view of the incentives of the agents with whom they are communicating.

打算 发表于 2025-3-28 09:54:57

Insights and Future Directionssons learned during its completion. These insights are situated within the current state of cybersecurity research, and more importantly, within current societal challenges. Second, we outline an ambitious range of future research which could be carried out using this book as a foundation.

Defiance 发表于 2025-3-28 11:24:38

Current Challenges in Cyber Deceptionon that are found more broadly in the existing literature. As a point of reference, we refer to the research works mentioned in Chap. .. The literature discussed in Chap. . points towards four major challenges in cyber deception.
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Game Theory for Cyber Deception; From Theory to Appli Jeffrey Pawlick,Quanyan Zhu Book 2021 Springer Nature Switzerland AG 2021 Game Theory