![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Book
-
Book
-
Chapter
Correction to: Autonomous Cyber Deception
This book was inadvertently published as an authored work with the chapter authors mentioned in the footnotes of the chapter opening pages. This has now been updated and the chapter authors have been mentioned...
-
Book
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense
Control- and Game-Theoretic Approaches to Cyber Security
-
Book
-
Chapter
Computer-Aided Human Centric Cyber Situation Awareness
In this chapter, we provide an overview of Cyber Situational Awareness, an emerging research area in the broad field of cyber security, and discuss, at least at a high level, how to gain Cyber Situation Awaren...
-
Book
-
Book
-
Chapter
Introduction
Authentication of a user or a device is absolutely essential before it can be allowed access to critical and protected resources or services. Most of the existing fingerprint-based authentication systems have ...
-
Chapter
Conclusion
We identify a series of research questions for further work in the broad area of fingerprinting.
-
Chapter
A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks
In many wireless networks (e.g., tactical military networks), the one-to-multiple communication model is pervasive due to commanding and control requirements in mission operations. In these networks, the roles...
-
Book
-
Book
-
Chapter
Modeling the Impact of Jamming Attacks on Time-Critical Traffic with Applications to Smart Grid
In this chapter, we aim at modeling and detecting jamming attacks against time-critical wireless networks with applications to the smart grid. In contrast to communication networks where packets-oriented metri...
-
Chapter
Understanding the Resilience of Mobile Cloud Services to Malware
In this chapter, we aim to measure the resilience of mobile cloud services to malware. Since the cloud is intended to provide real-time services to mobile users, we introduce a new metric, resilience factor, to d...
-
Chapter
Modeling and Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks
With the advancement with flexible and configurable wireless adapters, it becomes feasible for a node to modify its low-layer (e.g. physical or MAC layer) parameters, which can substantially affect the network...
-
Chapter
Minimizing Message Delay of Time-Critical Traffic for Wireless Smart Grid Applications Under Jamming
In the previous chapter, we offered a comprehensive study on modeling and detecting jamming attacks against time-critical wireless networks with applications to the smart grid. However, only modeling and detec...
-
Book
-
Book
-
Book