Game Theory for Cyber Deception
From Theory to Applications
Produktform: E-Buch Text Elektronisches Buch in proprietärem
The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception.
weiterlesen
Dieser Artikel gehört zu den folgenden Serien
106,99 € inkl. MwSt.
Recommended Retail Price
kostenloser Versand
lieferbar - Lieferzeit 10-15 Werktage
zurück