Skip to main content

Foundations of Cyber Deception

Modeling, Analysis, Design, Human Factors, and Their Convergence

  • Book
  • Aug 2025

Overview

  • Offers multidisciplinary methods
  • Features experiments and case studies
  • Provides actionable frameworks

Part of the book series: Advances in Information Security (ADIS, volume 90)

Buy print copy

Hardcover Book USD 199.99
Price excludes VAT (USA)
This title has not yet been released. You may pre-order it now and we will ship your order when it is published on 19 Aug 2025.
  • Durable hardcover edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

About this book

This book, structured as an edited volume, consists of 12 chapters organized into four key themes: Theoretical Foundations, Human Factors, Application Domains, and Future Challenges. It highlights the dynamic and interdisciplinary nature of cyber deception research, offering insights into diverse application areas such as industrial control systems and AI security.

Cyber deception has emerged as a critical strategy for defending digital assets across academia, industry, and government. By creating false information, deceptive environments, or misleading signals, it aims to confuse, delay, or misdirect adversaries while simultaneously gathering intelligence on their tactics. This proactive approach shifts the traditional information advantage from attackers to defenders, strengthening cybersecurity resilience.

Designed as a foundational resource, this book is particularly valuable for students and early-career researchers seeking to understand cyber deception and identify pressing research challenges. It emphasizes the need for context-aware and adaptive strategies to counter the ever-evolving tactics of cyber adversaries. Furthermore, this book advocates for leveraging emerging technologies and interdisciplinary approaches to advance deception techniques. By addressing both current and future challenges, this volume provides a comprehensive roadmap for enhancing cyber deception strategies and fostering the development of more robust and resilient cybersecurity defences.

Keywords

  • Cyber deception
  • Autonomous Defense
  • Game Theory
  • Artificial Intelligence (AI)
  • Machine Learning (ML)
  • Generative AI
  • Foundation Models
  • Human Factors
  • Cognitive Vulnerabilities
  • Behavioral Psychology
  • Cybersecurity Resilience
  • Enterprise Networks
  • Industrial Control Systems (ICS)
  • Cyber Insurance
  • Cyber-Physical Systems (CPS)
  • Network Security
  • Operational Technology (OT)
  • Cyber Warfare
  • Neurosymbolic learning
  • Risk Assessment

Editors and Affiliations

  • New York University, Brooklyn, USA

    Quanyan Zhu

  • University of South Florida, Tampa, USA

    Zhuo Lu

  • Army Research Laboratory, Adelphi, USA

    Paul L. Yu

  • National Science Foundation, Durham, USA

    Cliff Wang

About the editors

Quanyan Zhu is an Associate Professor in the Department of Electrical and Computer Engineering at New York University (NYU). He is also the director of the Laboratory for Agile and Resilient Complex Systems (LARX), which focuses on addressing security and resilience challenges in robotics, industrial control systems, manufacturing systems, Internet of Things (IoT), cyber-physical systems, and critical infrastructures. Dr. Zhu earned his Ph.D. in Electrical and Computer Engineering from the University of Illinois at Urbana-Champaign in 2013, a Master’s degree from the University of Toronto, and a Bachelor’s degree in Electrical Engineering from McGill University.

He has held positions as a Postdoctoral Research Associate at Princeton University and Visiting Researcher roles at institutions such as INRIA, the University of Houston, and the University of Waterloo. His research interests span optimal control, game theory, reinforcement learning, network security/privacy, and resilient control systems. Dr. Zhu has received multiple best paper awards and a National Science Foundation (NSF) CAREER Award. He has published extensively and is actively involved in advancing cybersecurity and complex systems research.

 Dr. Zhuo Lu is an Associate Professor in the Department of Electrical Engineering at the University of South Florida (USF) and leads the Communications, Security, and Analytics (CSA) Lab. He is also affiliated with CyberFlorida and holds a courtesy appointment with USF’s Department of Computer Science and Engineering. Dr. Lu earned his Ph.D. from North Carolina State University in 2013. His research focuses on wireless mobile design/security, IoT, cyber-physical systems, and secure AI systems. His work has been supported by prominent organizations like NSF, ARO, ONR, DOE, and CyberFlorida. Dr. Lu has received several prestigious awards, including the NSF CISE CRII Award (2016), IEEE GlobalSIP Best Paper Award (2019), and NSF CAREER Award (2021). He is a Senior Member of IEEE and serves as an Associate Editor for IEEE Transactions on Dependable and Secure Computing. Additionally, he actively teaches courses related to computer networks, cryptography, and wireless security at USF.

 Paul L. Yu received a Ph.D. degree in electrical engineering from the University of Maryland at College Park. He is the Program Manager for Information Assurance at the U.S. Army Combat Capabilities Development Command Army Research Laboratory (DEVCOM ARL) Army Research Office (ARO). This research program concentrates on funding cutting edge research in several domains, primarily conducted at U.S. universities, that enables complex systems to survive and recover from sophisticated adversarial disruption while accomplishing their missions. He has held technical leadership roles in several programs such as Cyber Security Collaborative Research Alliance and The Technical Cooperation Program. His work advances cyber security and signal processing for secure tactical networks, and he holds several patents in these areas.

 Dr. Cliff Wang graduated from North Carolina State University with a PhD in computer engineering. He has been carrying out research in the area of computer vision, medical imaging analysis, high speed networks, and most recently cyber security. He has authored technical papers on these areas in refereed journal, conferences, and symposiums and gave several keynote speeches. Dr. Wang authored/edited more than 20 books in the area of cyber security and holds 4 US patents on network security system development. Since 2003, Dr. Wang has been managing extramural research portfolio and leading cyber security research at funding agencies. Dr. Wang holds appointment at both Department of Computer Science and Department of Electrical and Computer Engineering at North Carolina State University. Dr. Wang is a Fellow of IEEE and AAAS.

Accessibility Information

PDF accessibility summary

This PDF has been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com. Please note that a more accessible version of this eBook is available as ePub.

EPUB accessibility summary

This ebook is designed with accessibility in mind, aiming to meet the ePub Accessibility 1.0 AA and WCAG 2.2 Level AA standards. It features a navigable table of contents, structured headings, and alternative text for images, ensuring smooth, intuitive navigation and comprehension. The text is reflowable and resizable, with sufficient contrast. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com.

Bibliographic Information

  • Book Title: Foundations of Cyber Deception

  • Book Subtitle: Modeling, Analysis, Design, Human Factors, and Their Convergence

  • Editors: Quanyan Zhu, Zhuo Lu, Paul L. Yu, Cliff Wang

  • Series Title: Advances in Information Security

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2026

  • Hardcover ISBN: 978-3-031-93866-5Due: 19 August 2025

  • Softcover ISBN: 978-3-031-93869-6Due: 19 August 2026

  • eBook ISBN: 978-3-031-93867-2Due: 19 August 2025

  • Series ISSN: 1568-2633

  • Series E-ISSN: 2512-2193

  • Edition Number: 1

  • Number of Pages: X, 270

Publish with us