Correction to: Autonomous Cyber Deception (Autonomous Cyber Deception, (2019), (1-237), 10.1007/978-3-030-02110-8)

  • E. Al-Shaer*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

1 Scopus citations

Abstract

This book was inadvertently published as an authored work with the chapter authors mentioned in the footnotes of the chapter opening pages. This has now been updated and the chapter authors have been mentioned in the respective chapter opening pages as mentioned below: Chapter 1 Using Deep Learning to Generate Relational HoneyData Nazmiye Ceren Abay, Cuneyt Gurcan Akcora, Yan Zhou, Murat Kantarcioglu, and Bhavani Thuraisingham Chapter 2 Towards Intelligent Cyber Deception Systems Fabio De Gaspari, Sushil Jajodia, Luigi V. Mancini, and Giulio Pagnotta Chapter 3 Honeypot Deception Tactics Neil C. Rowe Chapter 4 Modeling and Analysis of Deception Games Based on Hypergame Theory Jin-Hee Cho, Mu Zhu, and Munindar Singh Chapter 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception Linan Huang and Quanyan Zhu Chapter 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception: Framework, Metrics, and Deployment Qi Duan, Ehab Al-Shaer, and Mazharul Islam Chapter 7 NetShifter: A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution Gahng-Seop Ahn, Kyung Joon Kwak, Alexey Bogaevskiy, Jason Li, Gregory Briskin, and Robert Vaeth Chapter 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection Frederico Araujo, Gbadebo Ayoade, Kevin W. Hamlen, and Latifur Khan Chapter 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views Reham Mohamed, Terrence O’Connor, Markus Miettinen, William Enck, and Ahmad-Reza Sadeghi Chapter 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception Mohammed Noraden Alsaleh, Jinpeng Wei, Ehab Al-Shaer, and Mohiuddin Ahmed Chapter 11 Malware Deception with Automatic Analysis and Generation of HoneyResource Zhaoyan Xu, Jialong Zhang, Zhiqiang Lin, and Guofei Gu Cover corrected to reflect editor information.

Original languageEnglish
Title of host publicationAutonomous Cyber Deception
Subtitle of host publicationReasoning, Adaptive Planning, and Evaluation of HoneyThings
PublisherSpringer International Publishing
PagesC1-C2
ISBN (Electronic)9783030021108
ISBN (Print)9783030021092
DOIs
StatePublished - 1 Jan 2019
Externally publishedYes

Bibliographical note

Publisher Copyright:
© Springer Nature Switzerland AG 2019, corrected publication 2019

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Correction to: Autonomous Cyber Deception (Autonomous Cyber Deception, (2019), (1-237), 10.1007/978-3-030-02110-8)'. Together they form a unique fingerprint.

Cite this