This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framew
243 114 2MB
English Pages 251 Year 2015
Report DMCA / Copyright
DOWNLOAD FILE
This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive s
563 147 6MB Read more
665 124 8MB Read more
541 139 21MB Read more
This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber
1,458 62 6MB Read more
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporat
1,114 179 6MB Read more
The streets of Victorian London are clothed in shadows and secrets in Tessa Harris's gripping new mystery featuring
559 46 816KB Read more
981 186 22MB Read more
People believe what they want to believe. It is a striking-yet all too familiar-fact about human beings that our belief-
626 136 636KB Read more
What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cy
252 53 3MB Read more
Annotation This title is dedicated to understanding and fighting advanced persistent threats, today's most pernicio
187 13 4MB Read more