000756497 000__ 02980cam\a2200445Ii\4500 000756497 001__ 756497 000756497 005__ 20230306142018.0 000756497 006__ m\\\\\o\\d\\\\\\\\ 000756497 007__ cr\cn\nnnunnun 000756497 008__ 160721s2016\\\\gw\a\\\\o\\\\\000\0\eng\d 000756497 020__ $$a9783319326993$$q(electronic book) 000756497 020__ $$a3319326996$$q(electronic book) 000756497 020__ $$z9783319326979 000756497 0247_ $$a10.1007/978-3-319-32699-3$$2doi 000756497 035__ $$aSP(OCoLC)ocn953832171 000756497 035__ $$aSP(OCoLC)953832171 000756497 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dN$T$$dYDXCP$$dN$T$$dEBLCP$$dOCLCF$$dAZU 000756497 049__ $$aISEA 000756497 050_4 $$aQA76.9.A25 000756497 08204 $$a005.8$$223 000756497 24500 $$aCyber deception$$h[electronic resource] :$$bbuilding the scientific foundation /$$cSushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, editors. 000756497 264_1 $$aCham :$$bSpringer,$$c2016. 000756497 300__ $$a1 online resource (x, 314 pages) :$$billustrations 000756497 336__ $$atext$$btxt$$2rdacontent 000756497 337__ $$acomputer$$bc$$2rdamedia 000756497 338__ $$aonline resource$$bcr$$2rdacarrier 000756497 5050_ $$aIntegrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception -- Quantifying Covertness in Deceptive Cyber Deception -- Design Considerations for Building Cyber Deception Systems -- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks -- Effective Cyber Deception -- Cyber-Deception and Attribution in Capture-the-Flag Exercises -- Deceiving Attackers by Creating a Virtual Attack Surface -- Embedded Honeypotting -- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks -- Exploring Malicious Hacker Forums -- Anonymity in an electronic Society: A Survey. 000756497 506__ $$aAccess limited to authorized users. 000756497 520__ $$aThis edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security. 000756497 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 21, 2016). 000756497 650_0 $$aComputer security. 000756497 650_0 $$aComputer fraud. 000756497 7001_ $$aJajodia, Sushil,$$eeditor. 000756497 7001_ $$aSubrahmanian, V. S.,$$eeditor. 000756497 7001_ $$aSwarup, Vipin,$$eeditor. 000756497 7001_ $$aWang, Cliff,$$eeditor. 000756497 852__ $$bebk 000756497 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-32699-3$$zOnline Access$$91397441.1 000756497 909CO $$ooai:library.usi.edu:756497$$pGLOBAL_SET 000756497 980__ $$aEBOOK 000756497 980__ $$aBIB 000756497 982__ $$aEbook 000756497 983__ $$aOnline 000756497 994__ $$a92$$bISE