001461307 000__ 04225cam\a2200577M\\4500 001461307 001__ 1461307 001461307 003__ OCoLC 001461307 005__ 20230503003346.0 001461307 006__ m\\\\\o\\d\\\\\\\\ 001461307 007__ cr\un\nnnunnun 001461307 008__ 230316s2022\\\\xx\\\\\\o\\\\\000\0\eng\d 001461307 019__ $$a1373232378 001461307 020__ $$a9783031166136$$q(electronic bk.) 001461307 020__ $$a3031166132$$q(electronic bk.) 001461307 020__ $$z3031166124 001461307 020__ $$z9783031166129 001461307 0247_ $$a10.1007/978-3-031-16613-6$$2doi 001461307 035__ $$aSP(OCoLC)1372369182 001461307 040__ $$aYDX$$beng$$cYDX$$dGW5XE$$dN$T$$dUKAHL$$dOCLCF 001461307 049__ $$aISEA 001461307 050_4 $$aTK5105.59 001461307 08204 $$a005.8$$223/eng/20230316 001461307 24500 $$aCyber deception:$$btechniques, strategies, and human aspects /$$cTiffany Bao, Milind Tambe, Cliff Wang, editors. 001461307 260__ $$a[S.l.] :$$bSpringer,$$c2022. 001461307 300__ $$a1 online resource. 001461307 4901_ $$aAdvances in information security ;$$v89 001461307 5050_ $$a1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception -- 2. Human-Subject Experiments on Risk-based Cyber Camouflage Games -- 3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- 4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- 5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- 6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- 7. Mee: Adaptive Honeyfile System for Insider Attacker Detection -- 8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- 9. Using Amnesia to Detect Credential Database Breaches -- 10. Deceiving ML-Based Friend-or-Foe Identification for Executables. 001461307 506__ $$aAccess limited to authorized users. 001461307 520__ $$aThis book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: Understanding humans cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on humans behaviors Designing deceptive techniques that supports the enforcement of deceptive strategies The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception. Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity. Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. 001461307 650_0 $$aComputer networks$$xSecurity measures. 001461307 650_0 $$aCyberspace$$xSecurity measures. 001461307 655_0 $$aElectronic books. 001461307 7001_ $$aBao, Tiffany,$$eeditor. 001461307 7001_ $$aTambe, Milind,$$d1965-$$eeditor. 001461307 7001_ $$aWang, Cliff,$$eeditor. 001461307 77608 $$iPrint version:$$z3031166124$$z9783031166129$$w(OCoLC)1340404265 001461307 830_0 $$aAdvances in information security ;$$v89. 001461307 852__ $$bebk 001461307 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-16613-6$$zOnline Access$$91397441.1 001461307 909CO $$ooai:library.usi.edu:1461307$$pGLOBAL_SET 001461307 980__ $$aBIB 001461307 980__ $$aEBOOK 001461307 982__ $$aEbook 001461307 983__ $$aOnline 001461307 994__ $$a92$$bISE