Overview
- Offers multidisciplinary methods
- Features experiments and case studies
- Provides actionable frameworks
Part of the book series: Advances in Information Security (ADIS, volume 90)
Buy print copy
Tax calculation will be finalised at checkout
About this book
This book, structured as an edited volume, consists of 12 chapters organized into four key themes: Theoretical Foundations, Human Factors, Application Domains, and Future Challenges. It highlights the dynamic and interdisciplinary nature of cyber deception research, offering insights into diverse application areas such as industrial control systems and AI security.
Cyber deception has emerged as a critical strategy for defending digital assets across academia, industry, and government. By creating false information, deceptive environments, or misleading signals, it aims to confuse, delay, or misdirect adversaries while simultaneously gathering intelligence on their tactics. This proactive approach shifts the traditional information advantage from attackers to defenders, strengthening cybersecurity resilience.
Designed as a foundational resource, this book is particularly valuable for students and early-career researchers seeking to understand cyber deception and identify pressing research challenges. It emphasizes the need for context-aware and adaptive strategies to counter the ever-evolving tactics of cyber adversaries. Furthermore, this book advocates for leveraging emerging technologies and interdisciplinary approaches to advance deception techniques. By addressing both current and future challenges, this volume provides a comprehensive roadmap for enhancing cyber deception strategies and fostering the development of more robust and resilient cybersecurity defences.
Keywords
- Cyber deception
- Autonomous Defense
- Game Theory
- Artificial Intelligence (AI)
- Machine Learning (ML)
- Generative AI
- Foundation Models
- Human Factors
- Cognitive Vulnerabilities
- Behavioral Psychology
- Cybersecurity Resilience
- Enterprise Networks
- Industrial Control Systems (ICS)
- Cyber Insurance
- Cyber-Physical Systems (CPS)
- Network Security
- Operational Technology (OT)
- Cyber Warfare
- Neurosymbolic learning
- Risk Assessment
Editors and Affiliations
About the editors
Quanyan Zhu is an Associate Professor in the Department of Electrical and Computer Engineering at New York University (NYU). He is also the director of the Laboratory for Agile and Resilient Complex Systems (LARX), which focuses on addressing security and resilience challenges in robotics, industrial control systems, manufacturing systems, Internet of Things (IoT), cyber-physical systems, and critical infrastructures. Dr. Zhu earned his Ph.D. in Electrical and Computer Engineering from the University of Illinois at Urbana-Champaign in 2013, a Master’s degree from the University of Toronto, and a Bachelor’s degree in Electrical Engineering from McGill University.
He has held positions as a Postdoctoral Research Associate at Princeton University and Visiting Researcher roles at institutions such as INRIA, the University of Houston, and the University of Waterloo. His research interests span optimal control, game theory, reinforcement learning, network security/privacy, and resilient control systems. Dr. Zhu has received multiple best paper awards and a National Science Foundation (NSF) CAREER Award. He has published extensively and is actively involved in advancing cybersecurity and complex systems research.
Dr. Zhuo Lu is an Associate Professor in the Department of Electrical Engineering at the University of South Florida (USF) and leads the Communications, Security, and Analytics (CSA) Lab. He is also affiliated with CyberFlorida and holds a courtesy appointment with USF’s Department of Computer Science and Engineering. Dr. Lu earned his Ph.D. from North Carolina State University in 2013. His research focuses on wireless mobile design/security, IoT, cyber-physical systems, and secure AI systems. His work has been supported by prominent organizations like NSF, ARO, ONR, DOE, and CyberFlorida. Dr. Lu has received several prestigious awards, including the NSF CISE CRII Award (2016), IEEE GlobalSIP Best Paper Award (2019), and NSF CAREER Award (2021). He is a Senior Member of IEEE and serves as an Associate Editor for IEEE Transactions on Dependable and Secure Computing. Additionally, he actively teaches courses related to computer networks, cryptography, and wireless security at USF.
Paul L. Yu received a Ph.D. degree in electrical engineering from the University of Maryland at College Park. He is the Program Manager for Information Assurance at the U.S. Army Combat Capabilities Development Command Army Research Laboratory (DEVCOM ARL) Army Research Office (ARO). This research program concentrates on funding cutting edge research in several domains, primarily conducted at U.S. universities, that enables complex systems to survive and recover from sophisticated adversarial disruption while accomplishing their missions. He has held technical leadership roles in several programs such as Cyber Security Collaborative Research Alliance and The Technical Cooperation Program. His work advances cyber security and signal processing for secure tactical networks, and he holds several patents in these areas.
Dr. Cliff Wang graduated from North Carolina State University with a PhD in computer engineering. He has been carrying out research in the area of computer vision, medical imaging analysis, high speed networks, and most recently cyber security. He has authored technical papers on these areas in refereed journal, conferences, and symposiums and gave several keynote speeches. Dr. Wang authored/edited more than 20 books in the area of cyber security and holds 4 US patents on network security system development. Since 2003, Dr. Wang has been managing extramural research portfolio and leading cyber security research at funding agencies. Dr. Wang holds appointment at both Department of Computer Science and Department of Electrical and Computer Engineering at North Carolina State University. Dr. Wang is a Fellow of IEEE and AAAS.
Accessibility Information
PDF accessibility summary
EPUB accessibility summary
Bibliographic Information
Book Title: Foundations of Cyber Deception
Book Subtitle: Modeling, Analysis, Design, Human Factors, and Their Convergence
Editors: Quanyan Zhu, Zhuo Lu, Paul L. Yu, Cliff Wang
Series Title: Advances in Information Security
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2026
Hardcover ISBN: 978-3-031-93866-5Due: 19 August 2025
Softcover ISBN: 978-3-031-93869-6Due: 19 August 2026
eBook ISBN: 978-3-031-93867-2Due: 19 August 2025
Series ISSN: 1568-2633
Series E-ISSN: 2512-2193
Edition Number: 1
Number of Pages: X, 270