Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Autonomous cyber deceptionreasoning,...
~
Al-Shaer, Ehab.
Autonomous cyber deceptionreasoning, adaptive planning, and evaluation of HoneyThings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Autonomous cyber deceptionby Ehab Al-Shaer ... [et al.].
Reminder of title:
reasoning, adaptive planning, and evaluation of HoneyThings /
other author:
Al-Shaer, Ehab.
Published:
Cham :Springer International Publishing :2019.
Description:
xvi, 235 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Computer security.
Online resource:
https://doi.org/10.1007/978-3-030-02110-8
ISBN:
9783030021108$q(electronic bk.)
Autonomous cyber deceptionreasoning, adaptive planning, and evaluation of HoneyThings /
Autonomous cyber deception
reasoning, adaptive planning, and evaluation of HoneyThings /[electronic resource] :by Ehab Al-Shaer ... [et al.]. - Cham :Springer International Publishing :2019. - xvi, 235 p. :ill. (some col.), digital ;24 cm.
1 Using Deep Learning to Generate Relational HoneyData -- 2 Towards Intelligent Cyber Deception Systems -- 3 Honeypot Deception Tactics -- 4 Modeling and Analysis of Deception Games based on Hypergame Theory -- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception -- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception - Framework, Metrics and Deployment -- 7 NetShifter - A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution -- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection -- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views -- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception -- 11 Malware Deception with Automatic Analysis and Generation of HoneyResource.
This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It's also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.
ISBN: 9783030021108$q(electronic bk.)
Standard No.: 10.1007/978-3-030-02110-8doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Autonomous cyber deceptionreasoning, adaptive planning, and evaluation of HoneyThings /
LDR
:02592nmm a2200325 a 4500
001
555179
003
DE-He213
005
20190102082002.0
006
m d
007
cr nn 008maaau
008
191121s2019 gw s 0 eng d
020
$a
9783030021108$q(electronic bk.)
020
$a
9783030021092$q(paper)
024
7
$a
10.1007/978-3-030-02110-8
$2
doi
035
$a
978-3-030-02110-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A939 2019
245
0 0
$a
Autonomous cyber deception
$h
[electronic resource] :
$b
reasoning, adaptive planning, and evaluation of HoneyThings /
$c
by Ehab Al-Shaer ... [et al.].
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xvi, 235 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
1 Using Deep Learning to Generate Relational HoneyData -- 2 Towards Intelligent Cyber Deception Systems -- 3 Honeypot Deception Tactics -- 4 Modeling and Analysis of Deception Games based on Hypergame Theory -- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception -- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception - Framework, Metrics and Deployment -- 7 NetShifter - A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution -- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection -- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views -- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception -- 11 Malware Deception with Automatic Analysis and Generation of HoneyResource.
520
$a
This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It's also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.
650
0
$a
Computer security.
$3
184416
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
1 4
$a
Security.
$3
760527
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Artificial Intelligence.
$3
212515
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
530743
700
1
$a
Al-Shaer, Ehab.
$3
699991
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-3-030-02110-8
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000167991
電子館藏
1圖書
電子書
EB QA76.9.A25 A939 2019 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-02110-8
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login