A Deception Planning Framework for Cyber Defense
暂无分享,去创建一个
[1] Adrian Perrig,et al. The Coremelt Attack , 2009, ESORICS.
[2] Philippe Jehiel,et al. A theory of deception , 2010 .
[3] Tomas Sochor,et al. Study of Internet Threats and Attack Methods Using Honeypots and Honeynets , 2014, CN.
[4] Felix C. Freiling,et al. The Nepenthes Platform: An Efficient Approach to Collect Malware , 2006, RAID.
[5] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[6] Chiaki Sakama,et al. A formal account of dishonesty , 2015, Log. J. IGPL.
[7] Daniel Grosu,et al. A Game Theoretic Investigation of Deception in Network Security , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[8] Neil C. Rowe,et al. Designing good deceptions in defense of information systems , 2004, 20th Annual Computer Security Applications Conference.
[9] N. Garg,et al. Deception in Honeynets: A Game-Theoretic Analysis , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.