Autonomous cyber deception : reasoning, adaptive planning, and evaluation of HoneyThings /

Saved in:
Bibliographic Details
Author / Creator:Al-Shaer, Ehab S., 1967- author.
Imprint:Cham, Switzerland : Springer, 2019.
Description:1 online resource (xvi, 235 pages) : illustrations (some color)
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11781038
Hidden Bibliographic Details
Other authors / contributors:Wei, Jinpeng, author.
Hamlen, Kevin, author.
Wang, Cliff, author.
ISBN:9783030021108
3030021106
9783030021092
3030021092
9783030021092
9783030021115
3030021114
Digital file characteristics:text file PDF
Notes:Online resource; title from PDF title page (SpringerLink, viewed January 17, 2019).
Summary:This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced, . This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It?s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.
Other form:Printed edition: 9783030021092
Printed edition: 9783030021115
Standard no.:10.1007/978-3-030-02110-8
Description
Summary:

This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception.

An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,.

This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It's also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.

Physical Description:1 online resource (xvi, 235 pages) : illustrations (some color)
ISBN:9783030021108
3030021106
9783030021092
3030021092
9783030021115
3030021114