Moving target defenses with and without cover deception
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Fred Cohen. A Mathematical Structure of Simple Defensive Network Deception , 2000, Comput. Secur..
[3] F. Cohen. The Use of Deception Techniques : Honeypots and Decoys , 2004 .
[4] Fred Cohen,et al. Leading attackers through attack graphs with deceptions , 2003, Comput. Secur..
[5] Fred Cohen,et al. A note on the role of deception in information protection , 1998, Computers & security.
[6] Frederick B. Cohen,et al. Operating system protection through program evolution , 1993, Comput. Secur..
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.