Cybersecurity and cognitive science. (2022)
- Record Type:
- Book
- Title:
- Cybersecurity and cognitive science. (2022)
- Main Title:
- Cybersecurity and cognitive science
- Further Information:
- Note: Edited by Ahmed A. Moustafa.
- Editors:
- Moustafa, Ahmed A, 1977-
- Contents:
- Part I: Social Engineering, Security, and Cyber Attacks 1. Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study Shouhuai Xu 2. A Dual Integrated Dynamic Intrusion Detection System (DID-IDS) for Protection Against Network and Social Engineering Attacks Ahmed A. Moustafa 3. Working from Home Users at Risk of the COVID-19 Ransomware Attacks Abubakar Bello 4. Individual Differences in Cyber Security Behavior Using Personality Based Models to Predict Susceptibility to Sextortion Attacks Abubakar Bello 5. The Development of a Logic for Capturing Mismorphisms: Deconstructing Security and Privacy Issues Vijay Harshed Kothari Part II: Behavioral Studies of Cybersecurity 6. Are you Anonymous? Social Psychological Processes of Hacking Groups John McAlaney 7. On the Relation Between Hacking and Autism or Autistic Traits: A Systematic Review of the Scientific Evidence Elena Rusconi 8. An Introduction to Cyberbullying Peter J. R. Macaulay and Lucy R. Betts 9. The Impact of Cyberbullying Across the Lifespan Lucy R. Betts 10. Cyber Situational Awareness Issues and Challenges Ulrik Franke, Annika Andreasson, Henrik Artman, Joel Brynielsson, Stefan Varga and Niklas Vilhelm 11. Development and Application of the Information Security Core Human Error Causes (IS-CHEC) Technique Mark Evans, Ying He, Leandros Maglaras and Helge Janicke Part III: Machine Learning and Modeling Applications to Cybersecurity 12. Machine Learning for the Security of HealthcarePart I: Social Engineering, Security, and Cyber Attacks 1. Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study Shouhuai Xu 2. A Dual Integrated Dynamic Intrusion Detection System (DID-IDS) for Protection Against Network and Social Engineering Attacks Ahmed A. Moustafa 3. Working from Home Users at Risk of the COVID-19 Ransomware Attacks Abubakar Bello 4. Individual Differences in Cyber Security Behavior Using Personality Based Models to Predict Susceptibility to Sextortion Attacks Abubakar Bello 5. The Development of a Logic for Capturing Mismorphisms: Deconstructing Security and Privacy Issues Vijay Harshed Kothari Part II: Behavioral Studies of Cybersecurity 6. Are you Anonymous? Social Psychological Processes of Hacking Groups John McAlaney 7. On the Relation Between Hacking and Autism or Autistic Traits: A Systematic Review of the Scientific Evidence Elena Rusconi 8. An Introduction to Cyberbullying Peter J. R. Macaulay and Lucy R. Betts 9. The Impact of Cyberbullying Across the Lifespan Lucy R. Betts 10. Cyber Situational Awareness Issues and Challenges Ulrik Franke, Annika Andreasson, Henrik Artman, Joel Brynielsson, Stefan Varga and Niklas Vilhelm 11. Development and Application of the Information Security Core Human Error Causes (IS-CHEC) Technique Mark Evans, Ying He, Leandros Maglaras and Helge Janicke Part III: Machine Learning and Modeling Applications to Cybersecurity 12. Machine Learning for the Security of Healthcare Systems Based on Internet of Things and Edge Computing? Devrim Unal, Shada Bennbaia and Ferhat Ozgur Catak 13. Lying Trolls: Detecting Deception and Text-Based Disinformation Using Machine Learning Alex V. Mbaziira, Maha Sabir and Micheline Al Harrack 14. Modeling the Effects of Network Size in a Deception Game Involving Honeypots Harsh Katakwar and Varun Dutt 15. Computational Modeling of Decisions in Cyber-Security Games in the Presence or Absence of Interdependence Information Varun Dutt … (more)
- Publisher Details:
- Amsterdam : Academic Press
- Publication Date:
- 2022
- Extent:
- 1 online resource
- Subjects:
- 005.8019
Computer security -- Psychological aspects
Cognitive science
Neurosciences - Languages:
- English
- ISBNs:
- 9780323906968
- Related ISBNs:
- 9780323905701
- Notes:
- Note: Description based on CIP data; resource not viewed.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.696874
- Ingest File:
- 12_031.xml