Author:
Aggarwal Palvi,Gautam Aksh,Agarwal Vaibhav,Gonzalez Cleotilde,Dutt Varun
Publisher
Springer International Publishing
Reference14 articles.
1. Whaley, B.: Toward a general theory of deception. J. Strateg. Stud. 5(1), 178–192 (1982)
2. Rowe, N.C., Custy, E.J.: Deception in cyber attacks. In: Cyber Warfare and Cyber Terrorism, pp. 91–96. IGI Global (2007)
3. Aggarwal, P., Gonzalez, C., Dutt, V.: Cyber-security: role of deception in cyber-attack detection. In: Advances in Human Factors in Cybersecurity, pp. 85–96. Springer, Cham (2016)
4. Aggarwal, P., Gonzalez, C., Dutt, V.: Looking from the hacker’s perspective: role of deceptive strategies in cyber security. In: 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), pp. 1–6. IEEE (2016)
5. Aggarwal, P., Gonzalez, C., Dutt, V.: Modeling the effects of amount and timing of deception in simulated network scenarios. In: 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), pp. 1–7. IEEE (2017)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献