Cyber Deception: Overview and the Road Ahead
暂无分享,去创建一个
[1] Mohammed H. Almeshekah,et al. Planning and Integrating Deception into Computer Security Defenses , 2014, NSPW '14.
[2] Daniel C. Dennett,et al. Intentional Systems Theory , 2009 .
[3] Ronald L. Rivest,et al. Honeywords: making password-cracking detectable , 2013, CCS.
[4] M. Haselton,et al. The Evolution of Cognitive Bias , 2015 .
[5] Mladen A. Vouk,et al. Defensive computer-security deception operations: processes, principles and techniques , 2006 .
[6] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[7] Michael B. Crouse,et al. Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses , 2015, MTD@CCS.
[8] Gail-Joon Ahn,et al. Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis , 2015, 2015 48th Hawaii International Conference on System Sciences.
[9] B. McLaughlin,et al. Oxford Handbook to the Philosophy of Mind , 2009 .
[10] C. Stoll. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .