,

Cybersecurity and Cognitive Science

Paperback Engels 2022 9780323905701
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Cybersecurity and Cognitive Science provides the reader with multiple examples of interactions between cybersecurity, psychology and neuroscience. Specifically, reviewing current research on cognitive skills of network security agents (e.g., situational awareness) as well as individual differences in cognitive measures (e.g., risk taking, impulsivity, procrastination, among others) underlying cybersecurity attacks. Chapters on detection of network attacks as well as detection of cognitive engineering attacks are also included. This book also outlines various modeling frameworks, including agent-based modeling, network modeling, as well as cognitive modeling methods to both understand and improve cybersecurity.

Specificaties

ISBN13:9780323905701
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Part I: Social Engineering, Security, and Cyber Attacks<br>1. Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study<br>2. A Dual Integrated Dynamic Intrusion Detection System (DID-IDS) for Protection Against Network and Social Engineering Attacks<br>3. Working from Home Users at Risk of the COVID-19 Ransomware Attacks<br>4. Individual Differences in Cyber Security Behavior Using Personality Based Models to Predict Susceptibility to Sextortion Attacks<br>5. The Development of a Logic for Capturing Mismorphisms: Deconstructing Security and Privacy Issues</p> <p>Part II: Behavioral Studies of Cybersecurity<br>6. Are you Anonymous? Social Psychological Processes of Hacking Groups<br>7. On the Relation Between Hacking and Autism or Autistic Traits: A Systematic Review of the Scientific Evidence<br>8. An Introduction to Cyberbullying<br>9. The Impact of Cyberbullying Across the Lifespan<br>10. Cyber Situational Awareness Issues and Challenges<br>11. Development and Application of the Information Security Core Human Error Causes (IS-CHEC) Technique</p> <p>Part III: Machine Learning and Modeling  Applications to Cybersecurity<br>12. Machine Learning for the Security of Healthcare Systems Based on Internet of Things and Edge  Computing?<br>13. Lying Trolls: Detecting Deception and Text-Based Disinformation Using Machine Learning<br>14. Modeling the Effects of Network Size in a Deception Game Involving Honeypots<br>15. Computational Modeling of Decisions in Cyber-Security Games in the Presence or Absence of Interdependence Information</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Cybersecurity and Cognitive Science