Author:
Bringer Matthew L.,Chelmecki Christopher A.,Fujinoki Hiroshi
Subject
Applied Mathematics,Computer Networks and Communications,Computer Science Applications,Safety Research,Information Systems,Software
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Application Layer Cyber Deception Without Developer Interaction;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08
2. symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception;ACM Transactions on Privacy and Security;2023-11-13
3. Large Language Models and Computer Security;2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA);2023-11-01
4. BALKÜPLERİNİN SALDIRI VE SAVUNMA AÇISINDAN İNCELENMESİ;İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi;2023-06-29
5. A Novel High-Interaction Honeypot Network for Internet of Vehicles;2023 31st Mediterranean Conference on Control and Automation (MED);2023-06-26