default search action
Cyber Deception 2016
- Sushil Jajodia, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Deception, Building the Scientific Foundation. Springer 2016, ISBN 978-3-319-32697-9 - Frank J. Stech, Kristin E. Heckman, Blake E. Strom:
Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense. 1-24 - Mohammed H. Almeshekah, Eugene H. Spafford:
Cyber Security Deception. 25-52 - George Cybenko, Gabriel Stocco, Patrick Sweeney:
Quantifying Covertness in Deceptive Cyber Operations. 53-69 - Greg Briskin, Dan Fayette, Nick Evancich, Vahid Rajabian-Schwart, Anthony Macera, Jason H. Li:
Design Considerations for Building Cyber Deception Systems. 71-97 - Zhuo Lu, Cliff Wang, Mingkui Wei:
A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks. 99-116 - Al Underbrink:
Effective Cyber Deception. 117-149 - Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little:
Cyber-Deception and Attribution in Capture-the-Flag Exercises. 151-167 - Massimiliano Albanese, Ermanno Battista, Sushil Jajodia:
Deceiving Attackers by Creating a Virtual Attack Surface. 169-201 - Frederico Araujo, Kevin W. Hamlen:
Embedded Honeypotting. 203-233 - Ehab Al-Shaer, Syed Fida Gillani:
Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks. 235-259 - Jana Shakarian, Andrew T. Gunn, Paulo Shakarian:
Exploring Malicious Hacker Forums. 261-284 - Mauro Conti, Fabio De Gaspari, Luigi Vincenzo Mancini:
Anonymity in an Electronic Society: A Survey. 285-314
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.