Author:
Papalitsas Jarko,Rauti Sampsa,Tammi Jani,Leppänen Ville
Publisher
Springer International Publishing
Reference42 articles.
1. M.H. Almeshekah and E.G. Spafford. Planning and Integrating Deception into Computer Security Defenses. In Proceedings of the 2014 workshop on New Security Paradigms Workshop, pages 127–138. ACM, 2014.
2. M.H. Almeshekah and E.G. Spafford. Cyber Security Deception, pages 23–50. Springer International Publishing, 2016.
3. D. Bacon and S. Goldstein. Hardware-assisted replay of multiprocessor programs. SIGPLAN Not., 26(12):194–206, December 1991.
4. K. Borders, Xin Zhao, and A. Prakash. Siren: catching evasive malware. In 2006 IEEE Symposium on Security and Privacy (S P’06), pages 6 pp.–85, May 2006.
5. M.L. Bringer, Chelmecki C.A., and Fujinoki H. The honeytank: a scalable approach to collect malicious internet traffic. I.J. Computer Network and Information Security, 10:63–75, 2012.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献