001469503 000__ 04801cam\\22006017i\4500 001469503 001__ 1469503 001469503 003__ OCoLC 001469503 005__ 20230803003333.0 001469503 006__ m\\\\\o\\d\\\\\\\\ 001469503 007__ cr\cn\nnnunnun 001469503 008__ 230608s2023\\\\sz\a\\\\o\\\\\000\0\eng\d 001469503 019__ $$a1381184551 001469503 020__ $$a9783031307096$$q(electronic bk.) 001469503 020__ $$a3031307097$$q(electronic bk.) 001469503 020__ $$z9783031307089 001469503 020__ $$z3031307089 001469503 0247_ $$a10.1007/978-3-031-30709-6$$2doi 001469503 035__ $$aSP(OCoLC)1381478913 001469503 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dYDX$$dUKAHL$$dOCLCF 001469503 049__ $$aISEA 001469503 050_4 $$aTJ213 001469503 08204 $$a006.2/2$$223/eng/20230608 001469503 1001_ $$aHuang, Linan,$$eauthor. 001469503 24510 $$aCognitive security :$$ba system-scientific approach /$$cLinan Huang, Quanyan Zhu. 001469503 264_1 $$aCham :$$bSpringer,$$c2023. 001469503 300__ $$a1 online resource (ix, 110 pages) :$$billustrations (some color). 001469503 336__ $$atext$$btxt$$2rdacontent 001469503 337__ $$acomputer$$bc$$2rdamedia 001469503 338__ $$aonline resource$$bcr$$2rdacarrier 001469503 4901_ $$aSpringerBriefs in computer science,$$x2191-5776 001469503 5050_ $$aChapter. 1. Introduction -- Chapter. 2. System-Scientific Methods -- Chapter. 3. Cognitive Capacities for Designing, Operating, Supervising, and Securing Complex Systems -- Chapter. 4. Review of System-Scientific Perspectives for Analysis, Exploitation, and Mitigation of Cognitive Vulnerabilities -- Chapter. 5. ADVERT: Defending against Reactive Attention Attacks -- Chapter. 6. RADAMS: Defending against Proactive Attention Attacks -- Chapter. 7. Summary and Conclusions. 001469503 506__ $$aAccess limited to authorized users. 001469503 520__ $$aThis book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise. This book demonstrates that as adversaries increasingly use manipulative and deceptive information to disrupt human cognitive processes, including sensation, attention, memory, and mental operations, humans are misled into fallacious reasoning and manipulated decisions that can lead to system-level meltdown. Cognitive security aims to protect humans from the exploitation of cognitive vulnerabilities, help them make informed decisions that are free from manipulation and undue influence, and mitigate the aggravating risk in the ensuing steps of the attacker’s kill chain. This book offers solutions that work across different fields, such as psychology, neuroscience, data science, social science, and game theory, to deal with cognitive threats. It guides the reader through the core ideas with figures, real-life examples, and case studies. Moreover, it formally defines all research questions, presents the results using mathematical theorems and proofs, and obtains insights through numerical validation. This book provides a self-contained and brief overview of essential system-scientific tools for modeling, analyzing, and mitigating cognitive vulnerabilities. The concepts of human cognitive capacities and cognitive vulnerabilities are formally discussed, followed by two case studies in the scenarios of reactive and proactive attention vulnerabilities. This book provides insights and applications on this transdisciplinary topic, with the goal of motivating future research in this emerging area and pushing the frontier of human-technology convergence. This book is a valuable reference for researchers and advanced-level students studying or working in cognitive security and related fields. It is also useful for decision-makers, managers, and professionals working within these related fields. 001469503 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed June 8, 2023). 001469503 650_0 $$aCooperating objects (Computer systems) 001469503 655_0 $$aElectronic books. 001469503 7001_ $$aZhu, Quanyan,$$eauthor. 001469503 77608 $$iPrint version: $$z3031307089$$z9783031307089$$w(OCoLC)1372621949 001469503 830_0 $$aSpringerBriefs in computer science,$$x2191-5776 001469503 852__ $$bebk 001469503 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-30709-6$$zOnline Access$$91397441.1 001469503 909CO $$ooai:library.usi.edu:1469503$$pGLOBAL_SET 001469503 980__ $$aBIB 001469503 980__ $$aEBOOK 001469503 982__ $$aEbook 001469503 983__ $$aOnline 001469503 994__ $$a92$$bISE