Author:
Li Huanruo,Guo Yunfei,Huo Shumin,Hu Hongchao,Sun Penghao
Publisher
Springer Science and Business Media LLC
Reference46 articles.
1. Hutchins E M, Cloppert M J, Amin R M, et al. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues Inform Warfare Secur Res, 2011, 1: 80
2. Compastié M, Badonnel R, Festor O, et al. From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models. Comput Secur, 2020, 97: 101905
3. Garcia M, Bessani A, Gashi I, et al. OS diversity for intrusion tolerance: myth or reality? In: Proceedings of 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks (DSN), 2011. 383–394
4. Achleitner S, La Porta T F, McDaniel P, et al. Deceiving network reconnaissance using SDN-based virtual topologies. IEEE Trans Netw Serv Manage, 2017, 14: 1098–1112
5. Carasik-Henmi A, Shinder T W, Amon C, et al. Chapter 4—Introduction to intrusion detection systems. In: The Best Damn Firewall Book Period. Burlington: Syngress, 2003. 111–124
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Simulating Deception for Web Applications Using Reinforcement Learning;Lecture Notes in Computer Science;2024
2. Deception in Drone Surveillance Missions: Strategic vs. Learning Approaches;Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing;2023-10-16
3. Flipit Game Deception Strategy Selection Method Based on Deep Reinforcement Learning;International Journal of Intelligent Systems;2023-09-07
4. Transparency-based reconnaissance for APT attacks;2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC);2023-06
5. Integrating Cyber Deception Into Attribute-Based Access Control (ABAC) for Insider Threat Detection;IEEE Access;2022