Atjaunināt sīkdatņu piekrišanu

E-grāmata: Cyber Deception: Building the Scientific Foundation

Edited by , Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Izdošanas datums: 15-Jul-2016
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319326993
  • Formāts - PDF+DRM
  • Cena: 177,85 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 15-Jul-2016
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319326993

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security. 

Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense.- Cyber Security Deception.- Quantifying Covertness in Deceptive Cyber Deception.- Design Considerations for Building Cyber Deception Systems.- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks.- Effective Cyber Deception.- Cyber-Deception and Attribution in Capture-the-Flag Exercises.- Deceiving Attackers by Creating a Virtual Attack Surface.- Embedded Honeypotting.- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks.- Exploring Malicious Hacker Forums.- Anonymity in an electronic Society: A Survey.
Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense
1(22)
Frank J. Stech
Kristin E. Heckman
Blake E. Strom
Cyber Security Deception
23(28)
Mohammed H. Almeshekah
Eugene H. Spafford
Quantifying Covertness in Deceptive Cyber Operations
51(18)
George Cybenko
Gabriel Stocco
Patrick Sweeney
Design Considerations for Building Cyber Deception Systems
69(28)
Greg Briskin
Dan Fayette
Nick Evancich
Vahid Rajabian-Schwart
Anthony Macera
Jason Li
A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks
97(18)
Zhuo Lu
Cliff Wang
Mingkui Wei
Effective Cyber Deception
115(34)
A.J. Underbrink
Cyber-Deception and Attribution in Capture-the-Flag Exercises
149(18)
Eric Nunes
Nimish Kulkarni
Paulo Shakarian
Andrew Ruef
Jay Little
Deceiving Attackers by Creating a Virtual Attack Surface
167(34)
Massimiliano Albanese
Ermanno Battista
Sushil Jajodia
Embedded Honeypotting
201(32)
Frederico Araujo
Kevin W. Hamlen
Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks
233(26)
Ehab Al-Shaer
Syed Fida Gillani
Exploring Malicious Hacker Forums
259(24)
Jana Shakarian
Andrew T. Gunn
Paulo Shakarian
Anonymity in an Electronic Society: A Survey
283
Mauro Conti
Fabio De Gaspari
Luigi Vincenzo Mancini
Erratum to Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense 1
Sushil Jajodia is University Professor, BDM International Professor, and the founding director of Center for Secure Information Systems in the Volgenau School of Engineering at the George Mason University, Fairfax, Virginia.  His research interests include security, privacy, databases, and distributed systems. He is an IEEE fellow and a recipient of several awards including 2016 IEEE Computer Society Technical Achievement Award.   His h-index is 90 and Erdos number is 2.V.S. Subrahmanian is Professor of Computer Science and Director of the Lab for Computational Cultural Dynamics and Director of the Center for Digital International Government at the University of Maryland. He is one of the world leaders in the development of both theoretical and practical, data-driven logical, probabilistic, and statistical methods to infer predictive models from diverse types of data sources and then using those predictive models to optimize one or more desired user/application goals.Vipin Swarup is the Chief Scientist for Cyber Security in MITRE's Cyber Security Technical Center. He leads MITRE's corporate cybersecurity research program which includes research projects in cyber analytics, active cyber defense, mobile computing security, embedded and cyber-physical systems security, and cyber resiliency. He is the recipient of MITREs first Technology Transfer Individual Contribution Award for entrepreneurial leadership and success in transferring MITRE innovations to the government and industry. Cliff Wang is the program director at US Army Research Office, managing a large portfolio of university research. He is also appointed as an adjunct professor at North Carolina State University. Dr. Wang is a fellow of IEEE.