Book Volume 56 2015

Cyber Warfare

Building the Scientific Foundation

ISBN: 978-3-319-14038-4 (Print) 978-3-319-14039-1 (Online)

Table of contents (15 chapters)

  1. Front Matter

    Pages i-xiii

  2. No Access

    Chapter

    Pages 1-13

    Cyber War Games: Strategic Jostling Among Traditional Adversaries

  3. No Access

    Chapter

    Pages 15-35

    Alternatives to Cyber Warfare: Deterrence and Assurance

  4. No Access

    Chapter

    Pages 37-56

    Identifying and Exploiting the Cyber High Ground for Botnets

  5. No Access

    Chapter

    Pages 57-80

    Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare

  6. No Access

    Chapter

    Pages 81-101

    Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security

  7. No Access

    Chapter

    Pages 103-140

    Cyber Counterdeception: How to Detect Denial & Deception (D&D)

  8. No Access

    Chapter

    Pages 141-149

    Automated Adversary Profiling

  9. No Access

    Chapter

    Pages 151-171

    Cyber Attribution: An Argumentation-Based Approach

  10. No Access

    Chapter

    Pages 173-206

    The Human Factor in Cybersecurity: Robust & Intelligent Defense

  11. No Access

    Chapter

    Pages 207-220

    CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War

  12. No Access

    Chapter

    Pages 221-235

    Active Discovery of Hidden Profiles in Social Networks Using Malware

  13. No Access

    Chapter

    Pages 237-263

    A Survey of Community Detection Algorithms Based On Analysis-Intent

  14. No Access

    Chapter

    Pages 265-285

    Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks

  15. No Access

    Chapter

    Pages 287-306

    Graph Mining for Cyber Security

  16. No Access

    Chapter

    Pages 307-321

    Programming Language Theoretic Security in the Real World: A Mirage or the Future?