Editor biographiesContributorsForewordPrefaceChapter 1: IntroductionChristopher D. Kiekintveld, Charles A. Kamhoua, Fei Fang, Quanyan ZhuPart 1: Game Theory for Cyber DeceptionChapter 2: Introduction to Game TheoryFei Fang, Shutian Liu, Anjon Basak, Quanyan Zhu, Christopher Kiekintveld, Charles A. KamhouaChapter 3: Scalable Algorithms for Identifying Stealthy Attackers in a Game Theoretic Framework Using DeceptionAnjon Basak, Charles Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher KiekintveldChapter 4: Honeypot Allocation Game over Attack Graphs for Cyber DeceptionAhmed H. Anwar, Charles Kamhoua, Nandi Leslie, Christopher KiekintveldChapter 5: Evaluating Adaptive Deception Strategies for Cyber Defense with Human ExperimentationPalvi Aggarwal, Marcus Gutierrez, Christopher Kiekintveld, Branislav Bosansky, Cleotilde GonzalezChapter 6: A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with DeceptionJie Fu, Abhishek N. KulkarniPart 2: Game Theory for Cyber SecurityChapter 7: Minimax Detection (MAD) for Computer Security: A Dynamic Program CharacterizationMuhammed O. Sayin, Dinuka Sahabandu, Muhammad Aneeq uz Zaman, Radha Poovendran, Tamer BasarChapter 8: Sensor Manipulation Games in Cyber SecurityJoão P. HespanhaChapter 9: Adversarial Gaussian Process Regression in Sensor NetworksYi Li, Xenofon Koutsoukos, Yevgeniy VorobeychikChapter 10: Moving Target Defense Games for Cyber Security: Theory and Applications Abdelrahman Eldosouky, Shamik SenguptaChapter 11: Continuous Authentication Security GamesSerkan Saritas, Ezzeldin Shereen, Henrik Sandberg, Gyorgy DanChapter 12: Cyber Autonomy in Software Security: Techniques and TacticsTiffany Bao, Yan ShoshitaishviliPart 3: Adversarial Machine Learning for Cyber SecurityChapter 13: A Game Theoretic Perspective on Adversarial Machine Learning and Related Cybersecurity ApplicationsYan Zhou, Murat Kantarcioglu, Bowei XiChapter 14: Adversarial Machine Learning in 5G Communications SecurityYalin Sagduyu, Tugba Erpek, Yi ShiChapter 15: Machine Learning in the Hands of a Malicious Adversary: A Near Future If Not Reality Keywhan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T. Kalbarczyk, Thenkurussi Kesavadas, Ravishankar K. IyerChapter 16: Trinity: Trust, Resilience and Interpretability of Machine Learning ModelsSusmit Jha, Anirban Roy, Brian Jalaian, Gunjan VermaPart 4: Generative Models for Cyber SecurityChapter 17: Evading Machine Learning based Network Intrusion Detection Systems with GANs Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Mike WeismanChapter 18: Concealment Charm (ConcealGAN): Automatic Generation of Steganographic Text using Generative Models to Bypass CensorshipNurpeiis Baimukan, Quanyan ZhuPart 5: Reinforcement Learning for Cyber SecurityChapter 19: Manipulating Reinforcement Learning: Stealthy Attacks on Cost SignalsYunhan Huang, Quanyan ZhuChapter 20: Resource-Aware Intrusion Response based on Deep Reinforcement Learning for Software-Defined Internet-of-Battle-ThingsSeunghyun Yoon, Jin-Hee Cho, Gaurav Dixit, Ing-Ray ChenPart 6: Other Machine Learning approach to Cyber SecurityChapter 21: Smart Internet Probing: Scanning Using Adaptive Machine LearningArmin Sarabi, Kun Jin, Mingyan LiuChapter 22: Semi-automated Parameterization of a Probabilistic Model using Logistic Regression - A TutorialStefan Rass, Sandra König, Stefan SchauerChapter 23: Resilient Distributed Adaptive Cyber-Defense using BlockchainGeorge Cybenko, Roger A. HallmanChapter 24: Summary and Future WorkQuanyan Zhu, Fei Fang
Charles A. Kamhoua, PhD, is a researcher at the United States Army Research Laboratory's Network Security Branch. He is co-editor of Assured Cloud Computing (2018) and Blockchain for Distributed Systems Security (2019), and Modeling and Design of Secure Internet of Things (2020).Christopher D. Kiekintveld, PhD, is Associate Professor at the University of Texas at El Paso. He is Director of Graduate Programs with the Computer Science Department.Fei Fang, PhD, is Assistant Professor in the Institute for Software Research at the School of Computer Science at Carnegie Mellon University.Quanyan Zhu, PhD, is Associate Professor in the Department of Electrical and Computer Engineering at New York University.