Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2973700
Abstract: File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works…
read more here.
Keywords:
access;
file;
based deception;
file based ... See more keywords