04116nam 22006495 450 991025500590332120200705042540.03-319-32699-610.1007/978-3-319-32699-3(CKB)3710000000754857(DE-He213)978-3-319-32699-3(MiAaPQ)EBC4594692(PPN)194516776(EXLCZ)99371000000075485720160715d2016 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierCyber Deception Building the Scientific Foundation /edited by Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (X, 312 p. 111 illus.) 3-319-32697-X Includes bibliographical references at the end of each chapters.Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception -- Quantifying Covertness in Deceptive Cyber Deception -- Design Considerations for Building Cyber Deception Systems -- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks -- Effective Cyber Deception -- Cyber-Deception and Attribution in Capture-the-Flag Exercises -- Deceiving Attackers by Creating a Virtual Attack Surface -- Embedded Honeypotting -- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks -- Exploring Malicious Hacker Forums -- Anonymity in an electronic Society: A Survey.This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.Computer securityComputer communication systemsApplication softwareData encryption (Computer science)Electrical engineeringSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Communications Engineering, Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/T24035Computer security.Computer communication systems.Application software.Data encryption (Computer science).Electrical engineering.Systems and Data Security.Computer Communication Networks.Information Systems Applications (incl. Internet).Cryptology.Communications Engineering, Networks.005.8Jajodia Sushiledthttp://id.loc.gov/vocabulary/relators/edtSubrahmanian V.Sedthttp://id.loc.gov/vocabulary/relators/edtSwarup Vipinedthttp://id.loc.gov/vocabulary/relators/edtWang Cliffedthttp://id.loc.gov/vocabulary/relators/edtBOOK9910255005903321Cyber Deception2149536UNINA