
Cybersecurity and Cognitive Science
- 1st Edition - May 27, 2022
- Imprint: Academic Press
- Editor: Ahmed Moustafa
- Language: English
- Paperback ISBN:9 7 8 - 0 - 3 2 3 - 9 0 5 7 0 - 1
- eBook ISBN:9 7 8 - 0 - 3 2 3 - 9 0 6 9 6 - 8
Cybersecurity and Cognitive Science provides the reader with multiple examples of interactions between cybersecurity, psychology and neuroscience. Specifically, reviewing curren… Read more
Purchase options

Institutional subscription on ScienceDirect
Request a sales quote- Outlines cognitive modeling within cybersecurity problems
- Reviews the connection between intrusion detection systems and human psychology
- Discusses various cognitive strategies for enhancing cybersecurity
- Summarizes the cognitive skills of efficient network security agents, including the role of situational awareness
Part I: Social Engineering, Security, and Cyber Attacks
1. Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study
Shouhuai Xu
2. A Dual Integrated Dynamic Intrusion Detection System (DID-IDS) for Protection Against Network and Social Engineering Attacks
Ahmed A. Moustafa
3. Working from Home Users at Risk of the COVID-19 Ransomware Attacks
Abubakar Bello
4. Individual Differences in Cyber Security Behavior Using Personality Based Models to Predict Susceptibility to Sextortion Attacks
Abubakar Bello
5. The Development of a Logic for Capturing Mismorphisms: Deconstructing Security and Privacy Issues
Vijay Harshed Kothari
Part II: Behavioral Studies of Cybersecurity
6. Are you Anonymous? Social Psychological Processes of Hacking Groups
John McAlaney
7. On the Relation Between Hacking and Autism or Autistic Traits: A Systematic Review of the Scientific Evidence
Elena Rusconi
8. An Introduction to Cyberbullying
Peter J. R. Macaulay and Lucy R. Betts
9. The Impact of Cyberbullying Across the Lifespan
Lucy R. Betts
10. Cyber Situational Awareness Issues and Challenges
Ulrik Franke, Annika Andreasson, Henrik Artman, Joel Brynielsson, Stefan Varga and Niklas Vilhelm
11. Development and Application of the Information Security Core Human Error Causes (IS-CHEC) Technique
Mark Evans, Ying He, Leandros Maglaras and Helge Janicke
Part III: Machine Learning and Modeling Applications to Cybersecurity
12. Machine Learning for the Security of Healthcare Systems Based on Internet of Things and Edge Computing?
Devrim Unal, Shada Bennbaia and Ferhat Ozgur Catak
13. Lying Trolls: Detecting Deception and Text-Based Disinformation Using Machine Learning
Alex V. Mbaziira, Maha Sabir and Micheline Al Harrack
14. Modeling the Effects of Network Size in a Deception Game Involving Honeypots
Harsh Katakwar and Varun Dutt
15. Computational Modeling of Decisions in Cyber-Security Games in the Presence or Absence of Interdependence Information
Varun Dutt
- Edition: 1
- Published: May 27, 2022
- No. of pages (Paperback): 400
- Imprint: Academic Press
- Language: English
- Paperback ISBN: 9780323905701
- eBook ISBN: 9780323906968
AM