Cyber Deception: Building The Scientific Foundation by Sushil JajodiaCyber Deception: Building The Scientific Foundation by Sushil Jajodia

Cyber Deception: Building The Scientific Foundation

bySushil JajodiaEditorV.S. Subrahmanian, Vipin Swarup

Hardcover | July 22, 2016

Pricing and Purchase Info


Earn 1,105 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems.
This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.

Sushil Jajodia is University Professor, BDM International Professor, and the founding director of Center for Secure Information Systems in the Volgenau School of Engineering at the George Mason University, Fairfax, Virginia.  His research interests include security, privacy, databases, and distributed systems. He is an IEEE fellow and ...
Title:Cyber Deception: Building The Scientific FoundationFormat:HardcoverDimensions:312 pages, 23.5 × 15.5 × 0.25 inPublished:July 22, 2016Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:331932697X

ISBN - 13:9783319326979


Table of Contents

Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense.- Cyber Security Deception.- Quantifying Covertness in Deceptive Cyber Deception.- Design Considerations for Building Cyber Deception Systems.- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks.- Effective Cyber Deception.- Cyber-Deception and Attribution in Capture-the-Flag Exercises.- Deceiving Attackers by Creating a Virtual Attack Surface.- Embedded Honeypotting.- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks.- Exploring Malicious Hacker Forums.- Anonymity in an electronic Society: A Survey.