サイバーセキュリティと認知科学<br>Cybersecurity and Cognitive Science

個数:1
紙書籍版価格
¥33,580
  • 電子書籍
  • ポイントキャンペーン

サイバーセキュリティと認知科学
Cybersecurity and Cognitive Science

  • 著者名:Moustafa Ph.D, Ahmed (EDT)
  • 価格 ¥28,333 (本体¥25,758)
  • Academic Press(2022/05/27発売)
  • 冬の読書を楽しもう!Kinoppy 電子書籍・電子洋書 全点ポイント25倍キャンペーン(~1/25)
  • ポイント 6,425pt (実際に付与されるポイントはご注文内容確認画面でご確認下さい)
  • 言語:ENG
  • ISBN:9780323905701
  • eISBN:9780323906968

ファイル: /

Description

Cybersecurity and Cognitive Science provides the reader with multiple examples of interactions between cybersecurity, psychology and neuroscience. Specifically, reviewing current research on cognitive skills of network security agents (e.g., situational awareness) as well as individual differences in cognitive measures (e.g., risk taking, impulsivity, procrastination, among others) underlying cybersecurity attacks. Chapters on detection of network attacks as well as detection of cognitive engineering attacks are also included. This book also outlines various modeling frameworks, including agent-based modeling, network modeling, as well as cognitive modeling methods to both understand and improve cybersecurity.- Outlines cognitive modeling within cybersecurity problems- Reviews the connection between intrusion detection systems and human psychology- Discusses various cognitive strategies for enhancing cybersecurity- Summarizes the cognitive skills of efficient network security agents, including the role of situational awareness

Table of Contents

Part I: Social Engineering, Security, and Cyber Attacks1. Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study2. A Dual Integrated Dynamic Intrusion Detection System (DID-IDS) for Protection Against Network and Social Engineering Attacks3. Working from Home Users at Risk of the COVID-19 Ransomware Attacks4. Individual Differences in Cyber Security Behavior Using Personality Based Models to Predict Susceptibility to Sextortion Attacks5. The Development of a Logic for Capturing Mismorphisms: Deconstructing Security and Privacy IssuesPart II: Behavioral Studies of Cybersecurity6. Are you Anonymous? Social Psychological Processes of Hacking Groups7. On the Relation Between Hacking and Autism or Autistic Traits: A Systematic Review of the Scientific Evidence8. An Introduction to Cyberbullying9. The Impact of Cyberbullying Across the Lifespan10. Cyber Situational Awareness Issues and Challenges11. Development and Application of the Information Security Core Human Error Causes (IS-CHEC) TechniquePart III: Machine Learning and Modeling  Applications to Cybersecurity12. Machine Learning for the Security of Healthcare Systems Based on Internet of Things and Edge  Computing?13. Lying Trolls: Detecting Deception and Text-Based Disinformation Using Machine Learning14. Modeling the Effects of Network Size in a Deception Game Involving Honeypots15. Computational Modeling of Decisions in Cyber-Security Games in the Presence or Absence of Interdependence Information

最近チェックした商品