Author:
Zaman Md Mahabub Uz,Tao Liangde,Maldonado Mark,Liu Chang,Sunny Ahmed,Xu Shouhuai,Chen Lin
Publisher
Springer Nature Switzerland
Reference53 articles.
1. Lecture Notes in Computer Science;LM Adleman,1990
2. Aggarwal, P., Du, Y., Singh, K., Gonzalez, C.: Decoys in cybersecurity: an exploratory study to test the effectiveness of 2-sided deception. arXiv preprint arXiv:2108.11037 (2021)
3. Al-Shaer, E., Wei, J., Kevin, W., Wang, C.: Autonomous Cyber Deception. Springer, Heidelberg (2019). https://doi.org/10.1007/978-3-030-02110-8
4. Almotairi, S., Clark, A., Mohay, G., Zimmermann, J.: A technique for detecting new attacks in low-interaction honeypot traffic. In: Proceedings of International Conference on Internet Monitoring and Protection (2009)
5. Almotairi, S.I., Clark, A.J., Mohay, G.M., Zimmermann, J.: Characterization of attackers’ activities in honeypot traffic using principal component analysis. In: Proceedings of IFIP International Conference on Network and Parallel Computing (2008)