Articles with "cyber deception" as a keyword



Photo from wikipedia

Fake Document Generation for Cyber Deception by Manipulating Text Comprehensibility

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2020.2980177

Abstract: Advanced cyber attackers can penetrate enterprise networks and steal critical documents containing intellectual property despite all access control measures. Cyber deception is one of many solutions to protect critical documents after an attacker penetrates the… read more here.

Keywords: document; generation; cyber deception; comprehensibility ... See more keywords
Photo by mluotio83 from unsplash

Honeypot Allocation for Cyber Deception Under Uncertainty

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2022.3179965

Abstract: Cyber deception aims to misrepresent the state of the network to mislead the attackers, falsify their reconnaissance conclusions, and deflect them away from their goals. Honeypots serve as decoy devices inside networks that can capture… read more here.

Keywords: honeypot allocation; cyber deception; game; deception ... See more keywords