Autonomous Cyber Deception Reasoning, Adaptive Planning, and Evaluation of HoneyThings /

This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this boo...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Al-Shaer, Ehab (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Wei, Jinpeng (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Hamlen, Kevin W. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Wang, Cliff (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03993nam a2200529 4500
001 978-3-030-02110-8
003 DE-He213
005 20191027152238.0
007 cr nn 008mamaa
008 190102s2019 gw | s |||| 0|eng d
020 |a 9783030021108  |9 978-3-030-02110-8 
024 7 |a 10.1007/978-3-030-02110-8  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Autonomous Cyber Deception  |h [electronic resource] :  |b Reasoning, Adaptive Planning, and Evaluation of HoneyThings /  |c edited by Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang. 
250 |a 1st ed. 2019. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2019. 
300 |a XVI, 235 p. 79 illus., 65 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a 1 Using Deep Learning to Generate Relational HoneyData -- 2 Towards Intelligent Cyber Deception Systems -- 3 Honeypot Deception Tactics -- 4 Modeling and Analysis of Deception Games based on Hypergame Theory -- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception -- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception - Framework, Metrics and Deployment -- 7 NetShifter - A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution -- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection -- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views -- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception -- 11 Malware Deception with Automatic Analysis and Generation of HoneyResource. 
520 |a This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It's also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced. 
650 0 |a Data protection. 
650 0 |a Computer communication systems. 
650 0 |a Artificial intelligence. 
650 0 |a Application software. 
650 1 4 |a Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28000 
650 2 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
650 2 4 |a Artificial Intelligence.  |0 http://scigraph.springernature.com/things/product-market-codes/I21000 
650 2 4 |a Information Systems Applications (incl. Internet).  |0 http://scigraph.springernature.com/things/product-market-codes/I18040 
700 1 |a Al-Shaer, Ehab.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Wei, Jinpeng.  |e editor.  |0 (orcid)0000-0002-6982-7386  |1 https://orcid.org/0000-0002-6982-7386  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Hamlen, Kevin W.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Wang, Cliff.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783030021092 
776 0 8 |i Printed edition:  |z 9783030021115 
856 4 0 |u https://doi.org/10.1007/978-3-030-02110-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)