Author:
Kiekintveld Christopher,Laszka Aron,Miah Mohammad Sujan,Roy Shanto,Sharmin Nazia
Publisher
Springer International Publishing
Reference50 articles.
1. Acosta, J. C., Basak, A., Kiekintveld, C., & Kamhoua, C. A. (2021). Lightweight ondemand honeypot deployment for cyber deception. In The 12th EAI International Conference on Digital Forensics & Cyber Crime (EAI ICDF2C), Singapore.
2. Anderson, B., & McGrew, D. (2017). Os fingerprinting: New techniques and a study of information gain and obfuscation. In 2017 IEEE Conference on Communications and Network Security (CNS) (pp. 1–9). IEEE.
3. Anjum, I., Miah, M. S., Zhu, M., Sharmin, N., Kiekintveld, C., Enck, W., & Singh, M. P. (2020). Optimizing vulnerability-driven honey traffic using game theory. arXiv preprint, arXiv:2002.09069.
4. Anwar, A. H., Kamhoua, C. A., & Leslie, N. (2020). Honeypot allocation over attack graphs in cyber deception games. In 2020 International Conference on Computing, Networking and Communications (ICNC) (pp. 502–506). IEEE.
5. Anwar, A. H., Kamhoua, C. A., Leslie, N., & Kiekintveld, C. D. (2021). Honeypot allocation games over attack graphs for cyber deception. Game theory and machine learning for cyber security (pp. 62–76).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献