New Perspectives in Behavioral Cybersecurity II
Human Behavior for Business, Profiling, Linguistics and Voting
Herausgeber: Patterson, Wayne
New Perspectives in Behavioral Cybersecurity II
Human Behavior for Business, Profiling, Linguistics and Voting
Herausgeber: Patterson, Wayne
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
New Approaches in Behavioral Cybersecurity II brings together international perspectives that explore how human behavior intersects with cybersecurity. The chapters highlight the integration of behavioral sciences like psychology, economics, and sociology with traditional cybersecurity approaches.
Andere Kunden interessierten sich auch für
- Murray RitchieSeven Bad Habits of Safety Management153,99 €
- Advances in Behavioral Based Safety131,99 €
- Behavioral Predictive Modeling in Economics139,99 €
- Krzysztof KrawiecBehavioral Program Synthesis with Genetic Programming77,99 €
- Nancy J StoneIntroduction to Human Factors220,99 €
- Vivek D BhiseErgonomics in the Automotive Design Process110,99 €
- Ricardo Zavala YoeModelling and Control of Dynamical Systems: Numerical Implementation in a Behavioral Framework79,99 €
-
-
-
New Approaches in Behavioral Cybersecurity II brings together international perspectives that explore how human behavior intersects with cybersecurity. The chapters highlight the integration of behavioral sciences like psychology, economics, and sociology with traditional cybersecurity approaches.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 232
- Erscheinungstermin: 30. Juli 2025
- Englisch
- Abmessung: 234mm x 156mm
- Gewicht: 453g
- ISBN-13: 9781032983523
- ISBN-10: 1032983523
- Artikelnr.: 73328121
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 232
- Erscheinungstermin: 30. Juli 2025
- Englisch
- Abmessung: 234mm x 156mm
- Gewicht: 453g
- ISBN-13: 9781032983523
- ISBN-10: 1032983523
- Artikelnr.: 73328121
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Dr. Wayne Patterson retired as a Professor of Computer Science at Howard University, Washington, DC, USA. In 1993, he was appointed Vice President for Research and Professional and Community Services, and Dean of the Graduate School at the College of Charleston, South Carolina. His other service to the graduate community in the United States has included being elected to the Presidency of the Conference of Southern Graduate Schools, and also to the Board of Directors of the Council of Graduate Schools. Dr. Patterson has published more than 50 scholarly articles primarily related to cybersecurity and recently New Perspectives in Behavioral Cybersecurity (CRC Press, 2024). He has received degrees from the University of Toronto (BSc and MSc in Mathematics), University of New Brunswick (MSc in Computer Science), and the University of Michigan (PhD in Mathematics). He has also held Post-Doctoral appointments at Princeton University and the University of California - Berkeley. He was named in the "Hall of Honour" at his undergraduate University, St. Francis Xavier University in Nova Scotia, Canada; and also by having a Graduate Fellowship named after him at the College of Charleston, in recognition of his being the Founding Dean of the Graduate School there.
1. Integrating Behavioral Sciences and Deep Learning in Network Behavior
Analysis for Threat Detection. 2. Cognition-Inspired Design in Mind:
Demonstrations in Graphical Authentication. 3. Cybersecurity Defense:
Against Pro or Amateur Attackers. 4. Hybrid Intelligence in Cybersecurity
Banking. 5. Efficient Intrusion Tolerant System Based on Machine Learning
and Human Behavior. 6. Personality Profiles of Cyber Criminals: An
Integration of Existing Research. 7. Cybersecurity is not on Maslow's
Hierarchy: Implications of the Difference between Users's Physical Security
and Cybersecurity Attitudes and Behaviors. 8. Using Language Translation
Software to Detect and Classify Cyberattacks from Suspected Cyberattackers
from Specific Countries and Languages. 9. Isolating Key Phrases to Identify
Ransomware Attackers. 10. Protecting Democracy in an Increasing Digital
World: A Philippine e-Voting Story. 11. Passwords: An Empirical Study of
Behaviors in the Social Media Era.
Analysis for Threat Detection. 2. Cognition-Inspired Design in Mind:
Demonstrations in Graphical Authentication. 3. Cybersecurity Defense:
Against Pro or Amateur Attackers. 4. Hybrid Intelligence in Cybersecurity
Banking. 5. Efficient Intrusion Tolerant System Based on Machine Learning
and Human Behavior. 6. Personality Profiles of Cyber Criminals: An
Integration of Existing Research. 7. Cybersecurity is not on Maslow's
Hierarchy: Implications of the Difference between Users's Physical Security
and Cybersecurity Attitudes and Behaviors. 8. Using Language Translation
Software to Detect and Classify Cyberattacks from Suspected Cyberattackers
from Specific Countries and Languages. 9. Isolating Key Phrases to Identify
Ransomware Attackers. 10. Protecting Democracy in an Increasing Digital
World: A Philippine e-Voting Story. 11. Passwords: An Empirical Study of
Behaviors in the Social Media Era.
1. Integrating Behavioral Sciences and Deep Learning in Network Behavior
Analysis for Threat Detection. 2. Cognition-Inspired Design in Mind:
Demonstrations in Graphical Authentication. 3. Cybersecurity Defense:
Against Pro or Amateur Attackers. 4. Hybrid Intelligence in Cybersecurity
Banking. 5. Efficient Intrusion Tolerant System Based on Machine Learning
and Human Behavior. 6. Personality Profiles of Cyber Criminals: An
Integration of Existing Research. 7. Cybersecurity is not on Maslow's
Hierarchy: Implications of the Difference between Users's Physical Security
and Cybersecurity Attitudes and Behaviors. 8. Using Language Translation
Software to Detect and Classify Cyberattacks from Suspected Cyberattackers
from Specific Countries and Languages. 9. Isolating Key Phrases to Identify
Ransomware Attackers. 10. Protecting Democracy in an Increasing Digital
World: A Philippine e-Voting Story. 11. Passwords: An Empirical Study of
Behaviors in the Social Media Era.
Analysis for Threat Detection. 2. Cognition-Inspired Design in Mind:
Demonstrations in Graphical Authentication. 3. Cybersecurity Defense:
Against Pro or Amateur Attackers. 4. Hybrid Intelligence in Cybersecurity
Banking. 5. Efficient Intrusion Tolerant System Based on Machine Learning
and Human Behavior. 6. Personality Profiles of Cyber Criminals: An
Integration of Existing Research. 7. Cybersecurity is not on Maslow's
Hierarchy: Implications of the Difference between Users's Physical Security
and Cybersecurity Attitudes and Behaviors. 8. Using Language Translation
Software to Detect and Classify Cyberattacks from Suspected Cyberattackers
from Specific Countries and Languages. 9. Isolating Key Phrases to Identify
Ransomware Attackers. 10. Protecting Democracy in an Increasing Digital
World: A Philippine e-Voting Story. 11. Passwords: An Empirical Study of
Behaviors in the Social Media Era.