Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
Honeyics: A high-interaction physics-aware honeynet for industrial control systems
Industrial control systems (ICSs) are vulnerable to cyber-physical attacks, ie, security
breaches in cyberspace that adversely affect the underlying physical processes. In this …
breaches in cyberspace that adversely affect the underlying physical processes. In this …
Ics honeypot interactions: A latitudinal study
The recent proliferation of sophisticated threats targeting the plant of Industrial Control
Systems (ICSs) has triggered a growing interest in the development of dedicated …
Systems (ICSs) has triggered a growing interest in the development of dedicated …
HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory Testing
The widespread use of programmable logic controllers (PLCs) in critical infrastructures has
given rise to escalating cybersecurity concerns regarding PLC attacks. As a proactive …
given rise to escalating cybersecurity concerns regarding PLC attacks. As a proactive …
PHCG: PLC honeypoint communication generator for industrial IoT
H Liu, Y Zhou, B Fang, Y Sun, N Hu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the rapid development of mobile and wireless technologies, the industrial
manufacturing sector has entered the era of automation. The proliferation of mobile devices …
manufacturing sector has entered the era of automation. The proliferation of mobile devices …
Llmpot: Automated llm-based industrial protocol and physical process emulation for ics honeypots
C Vasilatos, DJ Mahboobeh, H Lamri, M Alam… - ar** advanced persistent threats
Honeypots serve as a valuable deception technology, enabling security teams to gain
insights into the behaviour patterns of attackers and investigate cyber security breaches …
insights into the behaviour patterns of attackers and investigate cyber security breaches …
ICSNet: A Hybrid-Interaction Honeynet for Industrial Control Systems
Industrial Control Systems (ICS) manage several critical infrastructures, such as the
electrical grid and water treatment plants. ICS have been the target of cyberattacks designed …
electrical grid and water treatment plants. ICS have been the target of cyberattacks designed …
Reconfigurable and Scalable Honeynet for Cyber-Physical Systems
Industrial Control Systems (ICS) constitute the backbone of contemporary industrial
operations, ranging from modest heating, ventilation, and air conditioning systems to …
operations, ranging from modest heating, ventilation, and air conditioning systems to …
MySQL-Pot: A LLM-Based Honeypot for MySQL Threat Protection
Y Hu, S Cheng, Y Ma, S Chen, F **ao… - 2024 9th International …, 2024 - ieeexplore.ieee.org
Traditional network defense techniques such as firewalls and intrusion detection systems [1]
primarily involve passive defense, which often struggles to effectively counter the …
primarily involve passive defense, which often struggles to effectively counter the …