TY - BOOK AU - Huang,Linan AU - Zhu,Quanyan ED - SpringerLink (Online service) TI - Cognitive Security: A System-Scientific Approach T2 - SpringerBriefs in Computer Science, SN - 9783031307096 AV - QA76.9.A25 U1 - 005.8 23 PY - 2023/// CY - Cham PB - Springer International Publishing, Imprint: Springer KW - Data protection KW - Law and legislation KW - Artificial intelligence KW - Privacy KW - Artificial Intelligence N1 - Acceso multiusuario; Chapter. 1. Introduction -- Chapter. 2. System-Scientific Methods -- Chapter. 3. Cognitive Capacities for Designing, Operating, Supervising, and Securing Complex Systems -- Chapter. 4. Review of System-Scientific Perspectives for Analysis, Exploitation, and Mitigation of Cognitive Vulnerabilities -- Chapter. 5. ADVERT: Defending against Reactive Attention Attacks -- Chapter. 6. RADAMS: Defending against Proactive Attention Attacks -- Chapter. 7. Summary and Conclusions N2 - This book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise. This book demonstrates that as adversaries increasingly use manipulative and deceptive information to disrupt human cognitive processes, including sensation, attention, memory, and mental operations, humans are misled into fallacious reasoning and manipulated decisions that can lead to system-level meltdown. Cognitive security aims to protect humans from the exploitation of cognitive vulnerabilities, help them make informed decisions that are free from manipulation and undue influence, and mitigate the aggravating risk in the ensuing steps of the attacker's kill chain. This book offers solutions that work across different fields, such as psychology, neuroscience, data science, social science, and game theory, to deal with cognitive threats. It guides the reader through the core ideas with figures, real-life examples, and case studies. Moreover, it formally defines all research questions, presents the results using mathematical theorems and proofs, and obtains insights through numerical validation. This book provides a self-contained and brief overview of essential system-scientific tools for modeling, analyzing, and mitigating cognitive vulnerabilities. The concepts of human cognitive capacities and cognitive vulnerabilities are formally discussed, followed by two case studies in the scenarios of reactive and proactive attention vulnerabilities. This book provides insights and applications on this transdisciplinary topic, with the goal of motivating future research in this emerging area and pushing the frontier of human-technology convergence. This book is a valuable reference for researchers and advanced-level students studying or working in cognitive security and related fields. It is also useful for decision-makers, managers, and professionals working within these related fields UR - http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-30709-6 ER -