000 | 03273nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-3-319-32699-3 | ||
003 | DE-He213 | ||
005 | 20200420221252.0 | ||
007 | cr nn 008mamaa | ||
008 | 160715s2016 gw | s |||| 0|eng d | ||
020 |
_a9783319326993 _9978-3-319-32699-3 |
||
024 | 7 |
_a10.1007/978-3-319-32699-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCyber Deception _h[electronic resource] : _bBuilding the Scientific Foundation / _cedited by Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aX, 312 p. 111 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntegrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception -- Quantifying Covertness in Deceptive Cyber Deception -- Design Considerations for Building Cyber Deception Systems -- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks -- Effective Cyber Deception -- Cyber-Deception and Attribution in Capture-the-Flag Exercises -- Deceiving Attackers by Creating a Virtual Attack Surface -- Embedded Honeypotting -- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks -- Exploring Malicious Hacker Forums -- Anonymity in an electronic Society: A Survey. | |
520 | _aThis edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aElectrical engineering. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aCommunications Engineering, Networks. |
700 | 1 |
_aJajodia, Sushil. _eeditor. |
|
700 | 1 |
_aSubrahmanian, V.S. _eeditor. |
|
700 | 1 |
_aSwarup, Vipin. _eeditor. |
|
700 | 1 |
_aWang, Cliff. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319326979 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-32699-3 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c52652 _d52652 |