LEADER 04116nam 22006495 450 001 9910255005903321 005 20200705042540.0 010 $a3-319-32699-6 024 7 $a10.1007/978-3-319-32699-3 035 $a(CKB)3710000000754857 035 $a(DE-He213)978-3-319-32699-3 035 $a(MiAaPQ)EBC4594692 035 $a(PPN)194516776 035 $a(EXLCZ)993710000000754857 100 $a20160715d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Deception $eBuilding the Scientific Foundation /$fedited by Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (X, 312 p. 111 illus.) 311 $a3-319-32697-X 320 $aIncludes bibliographical references at the end of each chapters. 327 $aIntegrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception -- Quantifying Covertness in Deceptive Cyber Deception -- Design Considerations for Building Cyber Deception Systems -- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks -- Effective Cyber Deception -- Cyber-Deception and Attribution in Capture-the-Flag Exercises -- Deceiving Attackers by Creating a Virtual Attack Surface -- Embedded Honeypotting -- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks -- Exploring Malicious Hacker Forums -- Anonymity in an electronic Society: A Survey. 330 $aThis edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security. 606 $aComputer security 606 $aComputer communication systems 606 $aApplication software 606 $aData encryption (Computer science) 606 $aElectrical engineering 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aApplication software. 615 0$aData encryption (Computer science). 615 0$aElectrical engineering. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aCryptology. 615 24$aCommunications Engineering, Networks. 676 $a005.8 702 $aJajodia$b Sushil$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSubrahmanian$b V.S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSwarup$b Vipin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Cliff$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910255005903321 996 $aCyber Deception$92149536 997 $aUNINA