Cyber Deception

Building the Scientific Foundation

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber Deception by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319326993
Publisher: Springer International Publishing Publication: July 15, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319326993
Publisher: Springer International Publishing
Publication: July 15, 2016
Imprint: Springer
Language: English

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems.

This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems.

This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.

More books from Springer International Publishing

Cover of the book The Changing Governance of Higher Education and Research by
Cover of the book Novel Mechanisms of Memory by
Cover of the book Hydrogeology of a Large Oil-and-Gas Basin in Central Patagonia by
Cover of the book The Arrhythmic Patient in the Emergency Department by
Cover of the book Gay Mental Healthcare Providers and Patients in the Military by
Cover of the book Social Media: The Good, the Bad, and the Ugly by
Cover of the book Forest Soils by
Cover of the book Applied Computer Sciences in Engineering by
Cover of the book Judges, Judging and Humour by
Cover of the book Human Behavior Understanding in Networked Sensing by
Cover of the book Dynamics Near Quantum Criticality in Two Space Dimensions by
Cover of the book Human-Robot Interaction Strategies for Walker-Assisted Locomotion by
Cover of the book Agroecology by
Cover of the book Southeast Asia beyond Crises and Traps by
Cover of the book Essentials of Cerebellum and Cerebellar Disorders by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy