Shortcuts
Top of page (Alt+0)
Page content (Alt+9)
Page menu (Alt+8)
Your browser does not support javascript, some WebOpac functionallity will not be available.
.
Default
.
PageMenu
-
Main Menu
-
Simple Search
.
Advanced Search
.
Journal Search
.
Refine Search Results
.
Preferences
.
Search Menu
Simple Search
.
Advanced Search
.
New Items Search
.
Journal Search
.
Refine Search Results
.
Bottom Menu
Help
Italian
.
English
.
German
.
New Item Menu
New Items Search
.
New Items List
.
Links
SISSA Library
.
ICTP library
.
Italian National web catalog (SBN)
.
Trieste University web catalog
.
Udine University web catalog
.
© LIBERO v6.4.1sp220816
Page content
You are here
:
Catalogue Display
Catalogue Display
Game Theory for Cyber Deception: From Theory to Applications /
.
Bookmark this Record
Catalogue Record 51745
.
.
Author info on Wikipedia
.
.
LibraryThing
.
.
Google Books
.
.
Amazon Books
.
Catalogue Information
Catalogue Record 51745
.
Reviews
Catalogue Record 51745
.
British Library
Resolver for RSN-51745
Google Scholar
Resolver for RSN-51745
WorldCat
Resolver for RSN-51745
Catalogo Nazionale SBN
Resolver for RSN-51745
GoogleBooks
Resolver for RSN-51745
ICTP Library
Resolver for RSN-51745
.
Share Link
Jump to link
Catalogue Information
Field name
Details
Dewey Class
004.0151
Title
Game Theory for Cyber Deception ([EBook] :) : From Theory to Applications / / by Jeffrey Pawlick, Quanyan Zhu.
Author
Pawlick, Jeffrey
Added Personal Name
Zhu, Quanyan
Other name(s)
SpringerLink (Online service)
Edition statement
1st ed. 2021.
Publication
Cham : : Springer International Publishing : : Imprint: Birkhäuser, , 2021.
Physical Details
XIII, 190 p. 62 illus., 53 illus. in color. : online resource.
Series
Static & Dynamic Game Theory: Foundations & Applications
2363-8524
ISBN
9783030660659
Summary Note
This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field. The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception. Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.:
Contents note
Part I Fundamentals -- Introduction -- Nash and Stackelberg Games -- Introduction to Incomplete Information -- Part II Defensive Deception -- A Taxonomy of Defensive Deception -- Obfuscation -- Honey-X -- Attacker Engagement -- Part III Mitigation of Malicious Deception -- Strategic Trust -- Active Crowd Defense -- Part IV Challenges and Opportunities in Cyber Deception -- Insights and Future Directions -- Current Challenges in Cyber Deception.
Mode of acces to digital resource
Mode of access: World Wide Web. System requirements: Internet Explorer 6.0 (or higher) or Firefox 2.0 (or higher). Available as searchable text in PDF format.
System details note
Online access to this digital book is restricted to subscription institutions through IP address (only for SISSA internal users).
Internet Site
https://doi.org/10.1007/978-3-030-66065-9
Links to Related Works
Subject References:
Computer science—Mathematics
.
Data and Information Security
.
Data protection
.
Mathematical Applications in Computer Science
.
Authors:
author
.
Pawlick, Jeffrey
.
Zhu, Quanyan
.
Corporate Authors:
SpringerLink (Online service)
.
Series:
Static & Dynamic Game Theory: Foundations & Applications
.
Classification:
004.0151
.
.
ISBD Display
Catalogue Record 51745
.
Tag Display
Catalogue Record 51745
.
Related Works
Catalogue Record 51745
.
Marc XML
Catalogue Record 51745
.
Add Title to Basket
Catalogue Record 51745
.
Catalogue Information 51745
Beginning of record
.
Catalogue Information 51745
Top of page
.
Download Title
Catalogue Record 51745
Export
This Record
As
Labelled Format
Bibliographic Format
ISBD Format
MARC Format
MARC Binary Format
MARCXML Format
User-Defined Format:
Title
Author
Series
Publication Details
Subject
To
File
Email
Reviews
This item has not been rated.
Add a Review and/or Rating
51745
1
51745
-
2
51745
-
3
51745
-
4
51745
-
5
51745
-
Quick Search
Search for