LEADER 03755nam 22006735 450 001 9910255005903321 005 20251107173027.0 010 $a3-319-32699-6 024 7 $a10.1007/978-3-319-32699-3 035 $a(CKB)3710000000754857 035 $a(DE-He213)978-3-319-32699-3 035 $a(MiAaPQ)EBC4594692 035 $a(PPN)194516776 035 $a(EXLCZ)993710000000754857 100 $a20160715d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Deception $eBuilding the Scientific Foundation /$fedited by Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (X, 312 p. 111 illus.) 311 08$a3-319-32697-X 320 $aIncludes bibliographical references at the end of each chapters. 327 $aIntegrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception -- Quantifying Covertness in Deceptive Cyber Deception -- Design Considerations for Building Cyber Deception Systems -- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks -- Effective Cyber Deception -- Cyber-Deception and Attribution in Capture-the-Flag Exercises -- Deceiving Attackers by Creating a Virtual Attack Surface -- Embedded Honeypotting -- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks -- Exploring Malicious Hacker Forums -- Anonymity in an electronic Society: A Survey. 330 $aThis edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security. 606 $aData protection 606 $aComputer networks 606 $aApplication software 606 $aCryptography 606 $aData encryption (Computer science) 606 $aTelecommunication 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aCryptology 606 $aCommunications Engineering, Networks 615 0$aData protection. 615 0$aComputer networks. 615 0$aApplication software. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aTelecommunication. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aCryptology. 615 24$aCommunications Engineering, Networks. 676 $a005.8 702 $aJajodia$b Sushil$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSubrahmanian$b V.S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSwarup$b Vipin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Cliff$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910255005903321 996 $aCyber Deception$92149536 997 $aUNINA