LEADER 04382nam 22007215 450 001 9910682584603321 005 20251008140621.0 010 $a9783031166136 010 $a3031166132 024 7 $a10.1007/978-3-031-16613-6 035 $a(CKB)5580000000520992 035 $a(MiAaPQ)EBC7211675 035 $a(Au-PeEL)EBL7211675 035 $a(OCoLC)1375293665 035 $a(DE-He213)978-3-031-16613-6 035 $a(PPN)269093508 035 $a(EXLCZ)995580000000520992 100 $a20230308d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Deception $eTechniques, Strategies, and Human Aspects /$fedited by Tiffany Bao, Milind Tambe, Cliff Wang 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (252 pages) 225 1 $aAdvances in Information Security,$x2512-2193 ;$v89 311 08$a9783031166129 311 08$a3031166124 320 $aIncludes bibliographical references. 327 $a1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception -- 2. Human-Subject Experiments on Risk-based Cyber Camouflage Games -- 3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- 4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- 5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- 6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- 7. Mee: Adaptive Honeyfile System for Insider Attacker Detection -- 8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- 9. Using Amnesia to Detect Credential Database Breaches -- 10. Deceiving ML-Based Friend-or-Foe Identification for Executables. 330 $aThis book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: Understanding human?s cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human?s behaviors Designing deceptive techniques that supports the enforcement of deceptive strategies The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception. Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity. Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. 410 0$aAdvances in Information Security,$x2512-2193 ;$v89 606 $aData protection 606 $aUser interfaces (Computer systems) 606 $aHuman-computer interaction 606 $aMachine learning 606 $aComputer security 606 $aData and Information Security 606 $aUser Interfaces and Human Computer Interaction 606 $aMachine Learning 606 $aPrinciples and Models of Security 615 0$aData protection. 615 0$aUser interfaces (Computer systems) 615 0$aHuman-computer interaction. 615 0$aMachine learning. 615 0$aComputer security. 615 14$aData and Information Security. 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aMachine Learning. 615 24$aPrinciples and Models of Security. 676 $a005.8 702 $aBao$b Tiffany 702 $aTambe$b Milind 702 $aWang$b Cliff 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910682584603321 996 $aCyber Deception$92149536 997 $aUNINA