Cybersecurity and Cognitive Science
-10%
portes grátis
Cybersecurity and Cognitive Science
Moustafa, Ahmed
Elsevier Science & Technology
05/2022
400
Mole
Inglês
9780323905701
15 a 20 dias
450
Descrição não disponível.
Part I: Social Engineering, Security, and Cyber Attacks 1. Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study 2. A Dual Integrated Dynamic Intrusion Detection System (DID-IDS) for Protection Against Network and Social Engineering Attacks 3. Working from Home Users at Risk of the COVID-19 Ransomware Attacks 4. Individual Differences in Cyber Security Behavior Using Personality Based Models to Predict Susceptibility to Sextortion Attacks 5. The Development of a Logic for Capturing Mismorphisms: Deconstructing Security and Privacy Issues
Part II: Behavioral Studies of Cybersecurity 6. Are you Anonymous? Social Psychological Processes of Hacking Groups 7. On the Relation Between Hacking and Autism or Autistic Traits: A Systematic Review of the Scientific Evidence 8. An Introduction to Cyberbullying 9. The Impact of Cyberbullying Across the Lifespan 10. Cyber Situational Awareness Issues and Challenges 11. Development and Application of the Information Security Core Human Error Causes (IS-CHEC) Technique
Part III: Machine Learning and Modeling Applications to Cybersecurity 12. Machine Learning for the Security of Healthcare Systems Based on Internet of Things and Edge Computing? 13. Lying Trolls: Detecting Deception and Text-Based Disinformation Using Machine Learning 14. Modeling the Effects of Network Size in a Deception Game Involving Honeypots 15. Computational Modeling of Decisions in Cyber-Security Games in the Presence or Absence of Interdependence Information
Part II: Behavioral Studies of Cybersecurity 6. Are you Anonymous? Social Psychological Processes of Hacking Groups 7. On the Relation Between Hacking and Autism or Autistic Traits: A Systematic Review of the Scientific Evidence 8. An Introduction to Cyberbullying 9. The Impact of Cyberbullying Across the Lifespan 10. Cyber Situational Awareness Issues and Challenges 11. Development and Application of the Information Security Core Human Error Causes (IS-CHEC) Technique
Part III: Machine Learning and Modeling Applications to Cybersecurity 12. Machine Learning for the Security of Healthcare Systems Based on Internet of Things and Edge Computing? 13. Lying Trolls: Detecting Deception and Text-Based Disinformation Using Machine Learning 14. Modeling the Effects of Network Size in a Deception Game Involving Honeypots 15. Computational Modeling of Decisions in Cyber-Security Games in the Presence or Absence of Interdependence Information
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cybersecurity; hacking; phishing; passwords; online behavior; digital technology; decision-making; data protection; cyber criminals; machine learning; artificial intelligence; social engineering; cyberspace; cognitive security; network modeling; cognitive modeling; brain-computer interfaces
Part I: Social Engineering, Security, and Cyber Attacks 1. Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study 2. A Dual Integrated Dynamic Intrusion Detection System (DID-IDS) for Protection Against Network and Social Engineering Attacks 3. Working from Home Users at Risk of the COVID-19 Ransomware Attacks 4. Individual Differences in Cyber Security Behavior Using Personality Based Models to Predict Susceptibility to Sextortion Attacks 5. The Development of a Logic for Capturing Mismorphisms: Deconstructing Security and Privacy Issues
Part II: Behavioral Studies of Cybersecurity 6. Are you Anonymous? Social Psychological Processes of Hacking Groups 7. On the Relation Between Hacking and Autism or Autistic Traits: A Systematic Review of the Scientific Evidence 8. An Introduction to Cyberbullying 9. The Impact of Cyberbullying Across the Lifespan 10. Cyber Situational Awareness Issues and Challenges 11. Development and Application of the Information Security Core Human Error Causes (IS-CHEC) Technique
Part III: Machine Learning and Modeling Applications to Cybersecurity 12. Machine Learning for the Security of Healthcare Systems Based on Internet of Things and Edge Computing? 13. Lying Trolls: Detecting Deception and Text-Based Disinformation Using Machine Learning 14. Modeling the Effects of Network Size in a Deception Game Involving Honeypots 15. Computational Modeling of Decisions in Cyber-Security Games in the Presence or Absence of Interdependence Information
Part II: Behavioral Studies of Cybersecurity 6. Are you Anonymous? Social Psychological Processes of Hacking Groups 7. On the Relation Between Hacking and Autism or Autistic Traits: A Systematic Review of the Scientific Evidence 8. An Introduction to Cyberbullying 9. The Impact of Cyberbullying Across the Lifespan 10. Cyber Situational Awareness Issues and Challenges 11. Development and Application of the Information Security Core Human Error Causes (IS-CHEC) Technique
Part III: Machine Learning and Modeling Applications to Cybersecurity 12. Machine Learning for the Security of Healthcare Systems Based on Internet of Things and Edge Computing? 13. Lying Trolls: Detecting Deception and Text-Based Disinformation Using Machine Learning 14. Modeling the Effects of Network Size in a Deception Game Involving Honeypots 15. Computational Modeling of Decisions in Cyber-Security Games in the Presence or Absence of Interdependence Information
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.