找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Game Theory for Cyber Deception; From Theory to Appli Jeffrey Pawlick,Quanyan Zhu Book 2021 Springer Nature Switzerland AG 2021 Game Theory

[复制链接]
楼主: ARRAY
发表于 2025-3-26 22:32:47 | 显示全部楼层
发表于 2025-3-27 03:57:58 | 显示全部楼层
发表于 2025-3-27 08:56:18 | 显示全部楼层
Introductioness of threats to cyberspace has helped spur private and public investment in cyberdefense. Yet in the past 10 years, cyberthreats have not only continued to exist, but have also developed new forms based on the evolution of new technologies. This book can be seen as an attempt to confront that reality.
发表于 2025-3-27 12:50:36 | 显示全部楼层
发表于 2025-3-27 16:24:48 | 显示全部楼层
发表于 2025-3-27 18:35:07 | 显示全部楼层
Honey-X a species of crypsis (Sect. .). But in other species of deception, the defender aims to create a specific false belief. This is called mimesis. The present chapter studies static mimesis, or, ., which takes its name from technologies related to honeypots, honeytokens, etc.
发表于 2025-3-27 23:06:51 | 显示全部楼层
Attacker Engagementorked systems. Against APTs, active defense technologies create and exploit information asymmetry for defenders. If these active defenses are also dynamic, then we have the species of deception that Chap. . calls ..
发表于 2025-3-28 05:22:14 | 显示全部楼层
Strategic Trust and dependability. Unfortunately, the dynamic and plug-n-play nature of the IoT makes reputation-based trust systems insufficient. Hence, this chapter develops a framework for predictive or strategic trust in which agents make decisions in view of the incentives of the agents with whom they are communicating.
发表于 2025-3-28 09:54:57 | 显示全部楼层
Insights and Future Directionssons learned during its completion. These insights are situated within the current state of cybersecurity research, and more importantly, within current societal challenges. Second, we outline an ambitious range of future research which could be carried out using this book as a foundation.
发表于 2025-3-28 11:24:38 | 显示全部楼层
Current Challenges in Cyber Deceptionon that are found more broadly in the existing literature. As a point of reference, we refer to the research works mentioned in Chap. .. The literature discussed in Chap. . points towards four major challenges in cyber deception.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-23 04:51
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表