Author:
Hong Quan,Li Jiaqi,Guo Xizhong,Xie Pan,Zhai Lidong
Publisher
Springer Nature Switzerland
Reference21 articles.
1. Aggarwal, P., Gautam, A., Agarwal, V., Gonzalez, C., Dutt, V.: $$HackIT$$: a human-in-the-loop simulation tool for realistic cyber deception experiments. In: Ahram, T., Karwowski, W. (eds.) AHFE 2019. AISC, vol. 960, pp. 109–121. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-20488-4_11
2. Aggarwal, P., Gonzalez, C., Dutt, V.: Cyber-security: role of deception in cyber-attack detection. In: Nicholson, D. (ed.) AHFE 2016. AISC, vol. 501, pp. 85–96. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-41932-9_8
3. Aggarwal, P., Gonzalez, C., Dutt, V.: Modeling the effects of amount and timing of deception in simulated network scenarios. In: 2017 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA), pp. 1–7. IEEE (2017)
4. Al Amin, M.A.R., Shetty, S., Kamhoua, C.: Cyber deception metrics for interconnected complex systems. In: 2022 Winter Simulation Conference (WSC), pp. 473–483. IEEE (2022)
5. Almeshekah, M.H., Spafford, E.H., Atallah, M.J.: Improving security using deception. Technical report, CERIAS technical report 13. Center for Education and Research Information Assurance and Security, Purdue University (2013)