找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cyber Deception; Techniques, Strategi Tiffany Bao,Milind Tambe,Cliff Wang Book 2023 This is a U.S. government work and not under copyright

[复制链接]
查看: 45416|回复: 45
发表于 2025-3-21 18:39:39 | 显示全部楼层 |阅读模式
书目名称Cyber Deception
副标题Techniques, Strategi
编辑Tiffany Bao,Milind Tambe,Cliff Wang
视频video
概述Presents a comprehensive perspective in cyber deception and state of art in cyber deception research.Provides necessary elements related to cyber deception from cybersecurity techniques.Offers multi-d
丛书名称Advances in Information Security
图书封面Titlebook: Cyber Deception; Techniques, Strategi Tiffany Bao,Milind Tambe,Cliff Wang Book 2023 This is a U.S. government work and not under copyright
描述This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. .This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: . .Understanding human’s cognitive behaviors in decoyed network scenarios .Developing effective deceptive strategies based on human’s behaviors.Designing deceptive techniques that supports the enforcement of deceptive strategies.The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception..Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity..Chapter ‘Using Amnesia to Detect Credential Database Breaches‘ and Chapter ‘Deceiving ML
出版日期Book 2023
关键词Cybersecurity; Cyber deception; Honeypots; Human/Computer Interactions; Cognitive model; Game theory; Secu
版次1
doihttps://doi.org/10.1007/978-3-031-16613-6
isbn_softcover978-3-031-16615-0
isbn_ebook978-3-031-16613-6Series ISSN 1568-2633 Series E-ISSN 2512-2193
issn_series 1568-2633
copyrightThis is a U.S. government work and not under copyright protection in the U.S.; foreign copyright pro
The information of publication is updating

书目名称Cyber Deception影响因子(影响力)




书目名称Cyber Deception影响因子(影响力)学科排名




书目名称Cyber Deception网络公开度




书目名称Cyber Deception网络公开度学科排名




书目名称Cyber Deception被引频次




书目名称Cyber Deception被引频次学科排名




书目名称Cyber Deception年度引用




书目名称Cyber Deception年度引用学科排名




书目名称Cyber Deception读者反馈




书目名称Cyber Deception读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

1票 100.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 20:14:25 | 显示全部楼层
Suparna Kailash,Manju Mehta,Rajesh Sagar optimize a deceptive defense based on camouflaging network and system attributes have shown effective numerical results on simulated data. However, these models possess a fundamental drawback due to the assumption that an attempted attack is always successful—as a direct consequence of the deceptiv
发表于 2025-3-22 01:09:59 | 显示全部楼层
发表于 2025-3-22 06:10:19 | 显示全部楼层
Michelle Sunico-Segarra,Armin Segarrauction to cognitive modeling techniques and concepts, including general goals, capabilities and limitations, cognitive architectures, and instance-based learning. It establishes that cognitive models’ reliance on generative mechanisms has predictive capabilities beyond those of purely data-driven te
发表于 2025-3-22 09:49:20 | 显示全部楼层
Michelle Sunico-Segarra,Armin Segarrase resources in security situations is modeled through Stackelberg Security Games, where defenders allocate the security resources using the schedule from a Strong Stackelberg Equilibrium (SSE) before attackers exploit the network. To further strengthen the security allocation and reduce the costs o
发表于 2025-3-22 15:38:45 | 显示全部楼层
Colin J. Theaker,Graham R. Brookes step in this kill chain is network reconnaissance, which has historically been active (e.g., network scans) and therefore detectable. However, new networking technology increases the possibility of . network reconnaissance, which is largely undetectable by defenders. In this chapter, we begin by in
发表于 2025-3-22 17:32:19 | 显示全部楼层
发表于 2025-3-22 22:01:05 | 显示全部楼层
发表于 2025-3-23 05:22:47 | 显示全部楼层
发表于 2025-3-23 07:13:32 | 显示全部楼层
https://doi.org/10.1007/978-3-030-43473-1ch that it deceives the attacker while still permitting the system to perform its intended function. We develop techniques to achieve such deception by studying a proxy problem: malware detection..Researchers and anti-virus vendors have proposed DNNs for malware detection from raw bytes that do not
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-5 00:31
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表