Subject
Law,General Computer Science
Reference198 articles.
1. Reinforcing the security of instant messaging systems using an enhanced honey encryption scheme: the case of whatsapp;Abiodun;Wireless Personal Communications,2020
2. How the spectre and meltdown hacks really worked;Abu-Ghazaleh;IEEE Spectr.,2019
3. Cybersecurity Deception Experimentation System;Acosta,2020
4. Deceptor-in-the-Middle (DitM): Cyber Deception for Security in Wireless Network Virtualization;Adebayo,2020
5. Random Host Mutation for Moving Target Defense;Al-Shaer,2013
Cited by
45 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. DECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and Blockchain;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Application Layer Cyber Deception Without Developer Interaction;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08
3. Digital-Twin-Driven Deception Platform: Vision and Way Forward;IEEE Internet Computing;2024-07
4. MLNT: A Multi-Level Network Traps Deployment Method;2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD);2024-05-08
5. A comprehensive survey on cyber deception techniques to improve honeypot performance;Computers & Security;2024-05