Improving Security using Deception
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. Honeywords: making password-cracking detectable , 2013, CCS.
[2] Wei Wang,et al. Detecting Targeted Attacks By Multilayer Deception , 2013, J. Cyber Secur. Mobil..
[3] Thomas C. Schmidt,et al. Design, Implementation, and Operation of a Mobile Honeypot , 2013, ArXiv.
[4] Collin Mulliner,et al. Poster : HoneyDroid-Creating a Smartphone Honeypot , 2011 .
[5] Haining Wang,et al. BogusBiter: A transparent protection against phishing attacks , 2010, TOIT.
[6] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[7] Adel Bouhoula,et al. Ensuring security in depth based on heterogeneous network security technologies , 2009, International Journal of Information Security.
[8] Chris Clifton,et al. Providing Privacy through Plausibly Deniable Search , 2009, SDM.
[9] Xu Chen,et al. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[10] Tobias Eggendorfer. Combining the SMTP tar pit simulator with white listing , 2008, Security and Management.
[11] Xuxian Jiang,et al. An Architectural Approach to Preventing Code Injection Attacks , 2010, IEEE Transactions on Dependable and Secure Computing.
[12] Ian Welch,et al. HoneyC - The low-interaction client honeypot , 2006 .
[13] Guofei Gu,et al. HoneyStat: Local Worm Detection Using Honeypots , 2004, RAID.
[14] J. Yuill,et al. Honeyfiles: deceptive files for intrusion detection , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[15] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[16] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[17] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[18] Brad L. Hutchings,et al. A dynamic instruction set computer , 1995, Proceedings IEEE Symposium on FPGAs for Custom Computing Machines.
[19] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[20] B. Cheswick. An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied , 1997 .
[21] C. Stoll. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .