Autonomous Cyber Deception

Reasoning, Adaptive Planning, and Evaluation of HoneyThings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Autonomous Cyber Deception by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783030021108
Publisher: Springer International Publishing Publication: January 2, 2019
Imprint: Springer Language: English
Author:
ISBN: 9783030021108
Publisher: Springer International Publishing
Publication: January 2, 2019
Imprint: Springer
Language: English

This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception.

 An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,.

 This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception.

 An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,.

 This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.

More books from Springer International Publishing

Cover of the book Statistical Approaches for Landslide Susceptibility Assessment and Prediction by
Cover of the book Teaching Graphic Novels in the English Classroom by
Cover of the book Nitric Oxide Action in Abiotic Stress Responses in Plants by
Cover of the book Hollywood in Crisis or: The Collapse of the Real by
Cover of the book Eco-Innovation and the Development of Business Models by
Cover of the book Theory and Practices on Innovating for Sustainable Development by
Cover of the book Advances in Cross-Cultural Decision Making by
Cover of the book Selberg Zeta Functions and Transfer Operators by
Cover of the book Nanoplasmonics, Nano-Optics, Nanocomposites, and Surface Studies by
Cover of the book Information and Software Technologies by
Cover of the book Peri-Urban Areas and Food-Energy-Water Nexus by
Cover of the book Linear Algebra for Computational Sciences and Engineering by
Cover of the book The Political Economy of Innovation Development by
Cover of the book Reviews of Environmental Contamination and Toxicology Volume 241 by
Cover of the book Endodontic Prognosis by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy