LEADER 04310nam 22005655 450 001 996546831203316 005 20230602165019.0 010 $a3-031-30709-7 024 7 $a10.1007/978-3-031-30709-6 035 $a(MiAaPQ)EBC30564822 035 $a(Au-PeEL)EBL30564822 035 $a(OCoLC)1381478913 035 $a(DE-He213)978-3-031-30709-6 035 $a(BIP)089626299 035 $a(PPN)272263257 035 $a(EXLCZ)9926821639000041 100 $a20230602d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCognitive Security$b[electronic resource] $eA System-Scientific Approach /$fby Linan Huang, Quanyan Zhu 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (117 pages) 225 1 $aSpringerBriefs in Computer Science,$x2191-5776 311 08$aPrint version: Huang, Linan Cognitive Security Cham : Springer International Publishing AG,c2023 9783031307089 327 $aChapter. 1. Introduction -- Chapter. 2. System-Scientific Methods -- Chapter. 3. Cognitive Capacities for Designing, Operating, Supervising, and Securing Complex Systems -- Chapter. 4. Review of System-Scientific Perspectives for Analysis, Exploitation, and Mitigation of Cognitive Vulnerabilities -- Chapter. 5. ADVERT: Defending against Reactive Attention Attacks -- Chapter. 6. RADAMS: Defending against Proactive Attention Attacks -- Chapter. 7. Summary and Conclusions. 330 $aThis book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise. This book demonstrates that as adversaries increasingly use manipulative and deceptive information to disrupt human cognitive processes, including sensation, attention, memory, and mental operations, humans are misled into fallacious reasoning and manipulated decisions that can lead to system-level meltdown. Cognitive security aims to protect humans from the exploitation of cognitive vulnerabilities, help them make informed decisions that are free from manipulation and undue influence, and mitigate the aggravating risk in the ensuing steps of the attacker?s kill chain. This book offers solutions that work across different fields, such as psychology, neuroscience, data science, social science, and game theory, to deal with cognitive threats. It guides the reader through the core ideas with figures, real-life examples, and case studies. Moreover, it formally defines all research questions, presents the results using mathematical theorems and proofs, and obtains insights through numerical validation. This book provides a self-contained and brief overview of essential system-scientific tools for modeling, analyzing, and mitigating cognitive vulnerabilities. The concepts of human cognitive capacities and cognitive vulnerabilities are formally discussed, followed by two case studies in the scenarios of reactive and proactive attention vulnerabilities. This book provides insights and applications on this transdisciplinary topic, with the goal of motivating future research in this emerging area and pushing the frontier of human-technology convergence. This book is a valuable reference for researchers and advanced-level students studying or working in cognitive security and related fields. It is also useful for decision-makers, managers, and professionals working within these related fields. 410 0$aSpringerBriefs in Computer Science,$x2191-5776 606 $aData protection?Law and legislation 606 $aArtificial intelligence 606 $aPrivacy 606 $aArtificial Intelligence 610 $aMathematics 615 0$aData protection?Law and legislation. 615 0$aArtificial intelligence. 615 14$aPrivacy. 615 24$aArtificial Intelligence. 676 $a004.019 700 $aHuang$b Linan$01363656 701 $aZhu$b Quanyan$0888933 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996546831203316 996 $aCognitive Security$93384498 997 $aUNISA