Author:
Haseeb Junaid,Malik Saif Ur Rehman,Mansoori Masood,Welch Ian
Subject
Law,General Computer Science
Reference46 articles.
1. Planning and integrating deception into computer security defenses;Almeshekah,2014
2. Cyber security deception;Almeshekah,2016
3. Markov decision processes with applications in wireless sensor networks: a survey;Alsheikh;IEEE Commun. Surv. Tutor.,2015
4. Reactive modules;Alur;Formal Methods Syst. Des.,1999
5. Understanding the mirai botnet;Antonakakis,2017
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献