Cyber deception building the scientific foundation /

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the comple...

Full description

Other Authors: Jajodia, Sushil, (Editor), Subrahmanian, V. S., (Editor), Swarup, Vipin, (Editor), Wang, Cliff, (Editor), SpringerLink (Online service)
Format: eBook
Language: English
Published: Cham : Springer, 2016.
Physical Description: 1 online resource (x, 314 pages) : illustrations.
Subjects:
LEADER 05643cam a2201009 i 4500
001 953832171
003 OCoLC
005 20240223121953.0
006 m o d
007 cr cnu|||unuuu
008 160721s2016 gw a o 000 0 eng d
015 |a GBB8N3675  |2 bnb 
016 7 |a 019148912  |2 Uk 
019 |a 953849260  |a 961141124  |a 990462513  |a 1005801757  |a 1011993203  |a 1026446535  |a 1048162449  |a 1066472122 
020 |a 9783319326993  |q (electronic bk.) 
020 |a 3319326996  |q (electronic bk.) 
020 |a 331932697X  |q (print) 
020 |a 9783319326979  |q (print) 
020 |z 9783319326979  |q (print) 
024 7 |a 10.1007/978-3-319-32699-3  |2 doi 
035 |a (OCoLC)953832171  |z (OCoLC)953849260  |z (OCoLC)961141124  |z (OCoLC)990462513  |z (OCoLC)1005801757  |z (OCoLC)1011993203  |z (OCoLC)1026446535  |z (OCoLC)1048162449  |z (OCoLC)1066472122 
037 |a com.springer.onix.9783319326993  |b Springer Nature 
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d N$T  |d YDXCP  |d N$T  |d EBLCP  |d OCLCF  |d AZU  |d COO  |d TJC  |d DKDLA  |d VT2  |d IDB  |d UAB  |d OCLCQ  |d IAD  |d JBG  |d ICW  |d Z5A  |d ILO  |d LIP  |d ICN  |d ESU  |d IOG  |d U3W  |d OCLCA  |d BUF  |d REB  |d OCLCQ  |d JG0  |d OCLCQ  |d CEF  |d KSU  |d OCLCQ  |d WYU  |d IDEBK  |d DEBSZ  |d UKMGB  |d UKAHL  |d OCLCQ  |d AJS  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
049 |a COM6 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Cyber deception :  |b building the scientific foundation /  |c Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, editors. 
264 1 |a Cham :  |b Springer,  |c 2016. 
300 |a 1 online resource (x, 314 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file. 
347 |b PDF. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed July 21, 2016). 
505 0 |a Integrating Cyber-D & D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception -- Quantifying Covertness in Deceptive Cyber Deception -- Design Considerations for Building Cyber Deception Systems -- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks -- Effective Cyber Deception -- Cyber-Deception and Attribution in Capture-the-Flag Exercises -- Deceiving Attackers by Creating a Virtual Attack Surface -- Embedded Honeypotting -- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks -- Exploring Malicious Hacker Forums -- Anonymity in an electronic Society: A Survey. 
520 |a This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security. 
650 0 |a Computer security. 
650 0 |a Computer fraud. 
650 2 |a Computer Security. 
650 6 |a Sécurité informatique. 
650 6 |a Fraude informatique. 
650 7 |a Network hardware.  |2 bicssc. 
650 7 |a Information retrieval.  |2 bicssc. 
650 7 |a Coding theory & cryptology.  |2 bicssc. 
650 7 |a Communications engineering  |x telecommunications.  |2 bicssc. 
650 7 |a Computer security.  |2 bicssc. 
650 7 |a Computers  |x Hardware  |x Network Hardware.  |2 bisacsh. 
650 7 |a Computers  |x Information Technology.  |2 bisacsh. 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh. 
650 7 |a Technology & Engineering  |x Telecommunications.  |2 bisacsh. 
650 7 |a Computer fraud.  |2 fast. 
650 7 |a Computer security.  |2 fast. 
700 1 |a Jajodia, Sushil,  |e editor. 
700 1 |a Subrahmanian, V. S.,  |e editor. 
700 1 |a Swarup, Vipin,  |e editor. 
700 1 |a Wang, Cliff,  |e editor. 
710 2 |a SpringerLink (Online service) 
776 0 8 |i Printed edition:  |z 9783319326979. 
907 |a .b51415112  |b multi  |c -  |d 160905  |e 240320 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g gw   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Overnight, in 2023.01 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2023.01 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.09 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a OCLC offline update by CMU 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150472183  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-319-32699-3  |3 SpringerLink  |z Click here for access