000 04552nam a22005655i 4500
001 978-3-031-30709-6
003 DE-He213
005 20240207153611.0
007 cr nn 008mamaa
008 230602s2023 sz | s |||| 0|eng d
020 _a9783031307096
_9978-3-031-30709-6
050 4 _aQA76.9.A25
050 4 _aJC596-596.2
072 7 _aURD
_2bicssc
072 7 _aCOM060040
_2bisacsh
072 7 _aURD
_2thema
082 0 4 _a005.8
_223
082 0 4 _a323.448
_223
100 1 _aHuang, Linan.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aCognitive Security
_h[electronic resource] :
_bA System-Scientific Approach /
_cby Linan Huang, Quanyan Zhu.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2023.
300 _aIX, 110 p. 30 illus., 29 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Computer Science,
_x2191-5776
500 _aAcceso multiusuario
505 0 _aChapter. 1. Introduction -- Chapter. 2. System-Scientific Methods -- Chapter. 3. Cognitive Capacities for Designing, Operating, Supervising, and Securing Complex Systems -- Chapter. 4. Review of System-Scientific Perspectives for Analysis, Exploitation, and Mitigation of Cognitive Vulnerabilities -- Chapter. 5. ADVERT: Defending against Reactive Attention Attacks -- Chapter. 6. RADAMS: Defending against Proactive Attention Attacks -- Chapter. 7. Summary and Conclusions.
520 _aThis book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise. This book demonstrates that as adversaries increasingly use manipulative and deceptive information to disrupt human cognitive processes, including sensation, attention, memory, and mental operations, humans are misled into fallacious reasoning and manipulated decisions that can lead to system-level meltdown. Cognitive security aims to protect humans from the exploitation of cognitive vulnerabilities, help them make informed decisions that are free from manipulation and undue influence, and mitigate the aggravating risk in the ensuing steps of the attacker's kill chain. This book offers solutions that work across different fields, such as psychology, neuroscience, data science, social science, and game theory, to deal with cognitive threats. It guides the reader through the core ideas with figures, real-life examples, and case studies. Moreover, it formally defines all research questions, presents the results using mathematical theorems and proofs, and obtains insights through numerical validation. This book provides a self-contained and brief overview of essential system-scientific tools for modeling, analyzing, and mitigating cognitive vulnerabilities. The concepts of human cognitive capacities and cognitive vulnerabilities are formally discussed, followed by two case studies in the scenarios of reactive and proactive attention vulnerabilities. This book provides insights and applications on this transdisciplinary topic, with the goal of motivating future research in this emerging area and pushing the frontier of human-technology convergence. This book is a valuable reference for researchers and advanced-level students studying or working in cognitive security and related fields. It is also useful for decision-makers, managers, and professionals working within these related fields.
541 _fUABC ;
_cPerpetuidad
650 0 _aData protection
_xLaw and legislation.
650 0 _aArtificial intelligence.
650 1 4 _aPrivacy.
650 2 4 _aArtificial Intelligence.
700 1 _aZhu, Quanyan.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031307089
776 0 8 _iPrinted edition:
_z9783031307102
830 0 _aSpringerBriefs in Computer Science,
_x2191-5776
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-30709-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cLIBRO_ELEC
999 _c261736
_d261735