Search
Search Results
-
Don’t Tell Me the Cybersecurity Moon Is Shining…
“Show, don’t tell” has become the literary commandment for any writer. It applies to all forms of fiction, and to non-fiction, including scientific... -
Explaining Cybersecurity with Films and the Arts
There are a large number of movies, TV series, novels, short stories, and even plays about cybersecurity and, in particular, about hackers. Some are... -
Insights and Future Directions
In this chapter, we attempt to go beyond a restatement of the content of the book. First, we consider the broader impacts of this research and the... -
Hybrid Threats: A European Response
This chapter looks at how the EU and NATO respond to hybrid threats. The chapter starts with a brief discussion of the hybrid terminology. It then... -
A Taxonomy of Defensive Deception
The game theory described in Chaps. 2 and 3 offers... -
Introduction
In 2008, the National Academy of Engineering (NAE) included among its 14 Engineering Grand Challenges the objective to “secure cyberspace” [1]. Since... -
Honey-X
The previous chapter discussed obfuscation, in which the defender’s goal is to hide valuable information within noise. Obfuscation, in other words,...