Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN Approach
暂无分享,去创建一个
[1] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[2] Dilshan Keragala,et al. Detecting Malware and Sandbox Evasion Techniques , 2018 .
[3] Roshan K. Thomas,et al. Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense , 2015 .
[4] William Yurcik,et al. Internet honeypots: protection or entrapment? , 2002, IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293).
[5] William M. S. Stout,et al. Computer network deception as a Moving Target Defense , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).
[6] Zhuo Lu,et al. Cyber Deception: Overview and the Road Ahead , 2018, IEEE Security & Privacy.