Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings

11Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It’s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.

Cite

CITATION STYLE

APA

Al-Shaer, E., Wei, J., Hamlen, K. W., & Wang, C. (2019). Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings. Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings (pp. 1–237). Springer International Publishing. https://doi.org/10.1007/978-3-030-02110-8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free