Cognitive Security (Record no. 178724)

MARC details
000 -LEADER
fixed length control field 04416nam a22005415i 4500
001 - CONTROL NUMBER
control field 978-3-031-30709-6
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423125517.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230602s2023 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031307096
-- 978-3-031-30709-6
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-031-30709-6
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number JC596-596.2
072 #7 - SUBJECT CATEGORY CODE
Subject category code URD
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code URD
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 323.448
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Huang, Linan.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
245 10 - TITLE STATEMENT
Title Cognitive Security
Medium [electronic resource] :
Remainder of title A System-Scientific Approach /
Statement of responsibility, etc by Linan Huang, Quanyan Zhu.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2023.
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2023.
300 ## - PHYSICAL DESCRIPTION
Extent IX, 110 p. 30 illus., 29 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement SpringerBriefs in Computer Science,
International Standard Serial Number 2191-5776
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter. 1. Introduction -- Chapter. 2. System-Scientific Methods -- Chapter. 3. Cognitive Capacities for Designing, Operating, Supervising, and Securing Complex Systems -- Chapter. 4. Review of System-Scientific Perspectives for Analysis, Exploitation, and Mitigation of Cognitive Vulnerabilities -- Chapter. 5. ADVERT: Defending against Reactive Attention Attacks -- Chapter. 6. RADAMS: Defending against Proactive Attention Attacks -- Chapter. 7. Summary and Conclusions.
520 ## - SUMMARY, ETC.
Summary, etc This book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise. This book demonstrates that as adversaries increasingly use manipulative and deceptive information to disrupt human cognitive processes, including sensation, attention, memory, and mental operations, humans are misled into fallacious reasoning and manipulated decisions that can lead to system-level meltdown. Cognitive security aims to protect humans from the exploitation of cognitive vulnerabilities, help them make informed decisions that are free from manipulation and undue influence, and mitigate the aggravating risk in the ensuing steps of the attacker’s kill chain. This book offers solutions that work across different fields, such as psychology, neuroscience, data science, social science, and game theory, to deal with cognitive threats. It guides the reader through the core ideas with figures, real-life examples, and case studies. Moreover, it formally defines all research questions, presents the results using mathematical theorems and proofs, and obtains insights through numerical validation. This book provides a self-contained and brief overview of essential system-scientific tools for modeling, analyzing, and mitigating cognitive vulnerabilities. The concepts of human cognitive capacities and cognitive vulnerabilities are formally discussed, followed by two case studies in the scenarios of reactive and proactive attention vulnerabilities. This book provides insights and applications on this transdisciplinary topic, with the goal of motivating future research in this emerging area and pushing the frontier of human-technology convergence. This book is a valuable reference for researchers and advanced-level students studying or working in cognitive security and related fields. It is also useful for decision-makers, managers, and professionals working within these related fields.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
General subdivision Law and legislation.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial intelligence.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Privacy.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial Intelligence.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Zhu, Quanyan.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031307089
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031307102
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title SpringerBriefs in Computer Science,
-- 2191-5776
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-031-30709-6">https://doi.org/10.1007/978-3-031-30709-6</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in