Author:
Acosta Jaime C.,Basak Anjon,Kiekintveld Christopher,Leslie Nandi,Kamhoua Charles
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Proactive threat hunting to detect persistent behaviour-based advanced adversaries;Egyptian Informatics Journal;2024-09
2. Application Layer Cyber Deception Without Developer Interaction;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08
3. Nodal Transmission in 5G Wireless Networking;2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC);2023-12-19
4. Locally-Hosted Fidelity-Adaptive Honeypots with Connection-Preserving Capabilities;MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM);2022-11-28
5. Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things;2022 IEEE Conference on Dependable and Secure Computing (DSC);2022-06-22