Framework For Modeling Attacker Capabilities with Deception

作者: Sharif Hassan

DOI:

关键词:

摘要:

参考文章(9)
Ari Juels, A bodyguard of lies: the use of honey objects in information security symposium on access control models and technologies. pp. 1- 4 ,(2014) , 10.1145/2613087.2613088
Mohammed H. Almeshekah, Eugene H. Spafford, Planning and Integrating Deception into Computer Security Defenses new security paradigms workshop. pp. 127- 138 ,(2014) , 10.1145/2683467.2683482
Rachna Dhamija, J. D. Tygar, Marti Hearst, Why phishing works human factors in computing systems. pp. 581- 590 ,(2006) , 10.1145/1124772.1124861
Miles A. McQueen, Wayne F. Boyer, Deception used for cyber defense of control systems conference on human system interactions. pp. 621- 628 ,(2009) , 10.1109/HSI.2009.5091050
Ayeni O.A, Alese B. K, Omotosho L. O., Design and Implementation of a Medium Interaction Honeypot International Journal of Computer Applications. ,vol. 70, pp. 5- 10 ,(2013) , 10.5120/12197-8136
N.C. Rowe, Measuring the Effectiveness of Honeypot Counter-Counterdeception hawaii international conference on system sciences. ,vol. 6, pp. 129- ,(2006) , 10.1109/HICSS.2006.269
Peter Komisarczuk, Ian Welch, Christian Seifert, Taxonomy of honeypots Victoria University of Wellington. ,(2006)
Sharif Hassan, Ratan Guha, A Probabilistic Study on the Relationship of Deceptions and Attacker Skills dependable autonomic and secure computing. pp. 693- 698 ,(2017) , 10.1109/DASC-PICOM-DATACOM-CYBERSCITEC.2017.121