• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Autonomous cyber deception :

پدید آورنده
Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang.

موضوع
Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.

رده
QA76
.
9
.
A25

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
3030021092
(Number (ISBN
3030021106
(Number (ISBN
3030021114
(Number (ISBN
9783030021092
(Number (ISBN
9783030021108
(Number (ISBN
9783030021115
Erroneous ISBN
9783030021092

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Autonomous cyber deception :
General Material Designation
[Book]
Other Title Information
reasoning, adaptive planning, and evaluation of HoneyThings /
First Statement of Responsibility
Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Cham, Switzerland :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
2019.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xvi, 235 pages) :
Other Physical Details
illustrations (some color)

CONTENTS NOTE

Text of Note
1 Using Deep Learning to Generate Relational HoneyData.- 2 Towards Intelligent Cyber Deception Systems.- 3 Honeypot Deception Tactics.- 4 Modeling and Analysis of Deception Games based on Hypergame Theory.- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception.- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception -- Framework, Metrics and Deployment.- 7 NetShifter -- A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution.- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection.- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views.- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception.- 11 Malware Deception with Automatic Analysis and Generation of HoneyResource.
0

SUMMARY OR ABSTRACT

Text of Note
This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced, . This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It?s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Springer Nature
Stock Number
com.springer.onix.9783030021108

OTHER EDITION IN ANOTHER MEDIUM

International Standard Book Number
9783030021092
International Standard Book Number
9783030021115

TOPICAL NAME USED AS SUBJECT

Computer networks-- Security measures.
Computer security.
Computer networks-- Security measures.
Computer security.

(SUBJECT CATEGORY (Provisional

COM053000
UR
UR

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25

PERSONAL NAME - PRIMARY RESPONSIBILITY

Al-Shaer, Ehab S.,1967-

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Hamlen, Kevin
Wang, Cliff
Wei, Jinpeng

ORIGINATING SOURCE

Date of Transaction
20200823073820.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival