Author:
Carroll Thomas E.,Grosu Daniel
Subject
Computer Networks and Communications,Information Systems
Reference27 articles.
1. Carroll TE Grosu D A game theoretic investigation of deception in network security Proceedings of the 18th IEEE International Conference on Computer Communications and Networks (ICCCN 2009), Workshop on Security, Privacy and Trust of Computer and Cyber-Physical Networks (SecureCPN 2009) 2009
2. Cohen F Koike D Misleading attackers with deception Proceedings of the 5th IEEE 2004 30 37
3. Michalski J Price C Stanton E et al Final report for the network security mechanisms utilizing network address translation LDRD project Technical Report SAND2002-3613 2002
4. Murphy S McDonald T Mills R An application of deception in cyberspace: Operating system obfuscation Proceedings of the 5th International Conference on Information Warfare and Security (ICIW 2010) 2010 241 249
5. Defending cyberspace with fake honeypots;Rowe;Journal of Computers,2007
Cited by
92 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献