Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2020.2980177
Abstract: Advanced cyber attackers can penetrate enterprise networks and steal critical documents containing intellectual property despite all access control measures. Cyber deception is one of many solutions to protect critical documents after an attacker penetrates the…
read more here.
Keywords:
document;
generation;
cyber deception;
comprehensibility ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Network and Service Management"
DOI: 10.1109/tnsm.2022.3179965
Abstract: Cyber deception aims to misrepresent the state of the network to mislead the attackers, falsify their reconnaissance conclusions, and deflect them away from their goals. Honeypots serve as decoy devices inside networks that can capture…
read more here.
Keywords:
honeypot allocation;
cyber deception;
game;
deception ... See more keywords