Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cyber warfare : building the scientific foundation
Jajodia S., Shakarian P., Subrahmanian V., Swarup V., Wang C., Springer Publishing Company, Incorporated, Cham, Switzerland, 2015. 321 pp. Type: Book (978-3-319140-38-4)
Date Reviewed: Jul 23 2015

This collection of basic research is designed for advanced students and practitioners. With a broad orientation including botnets, honeypots, human factors, game theory, big data, and cognitive modeling, several international researchers have contributed chapters concerning their work.

The papers move in a logical progression from cyber war as game theory. Alternatives to cyber warfare, identification and attribution of attacks, counter deception, human factors, discovery, vulnerability, and the realistic prospects for real security are all analyzed. The modeling of decision makers is demonstrated in an advanced formulation. Researchers present their “DeceiveGame” defense mechanism that is both efficient and effective. The strategic manipulation of information to both deceive and learn about an adversary is a useful strategy. Recording and tracking tools are useful sources of information. Automated adversary profiling is both cost effective and a rapidly available source of information. A reasoning system, intelligent cyber attribution (InCA), is introduced. All of the authors agree that increasingly complex attacks are a widespread threat and require increasingly sophisticated responses.

As is typical of the Springer series, the information is quite current and advanced. Each chapter is a standalone paper with its own list of references at the end; author contact information is provided. However, there is no comprehensive index and readers have to rely on the abstract and conclusion of each chapter to determine if a precise topic is discussed. Apart from this criticism, the book is one to include on your reference shelf.

Reviewer:  Brad Reid Review #: CR143645 (1510-0878)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
 
Games (I.2.1 ... )
 
 
Military (J.7 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy