Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack
Advanced persistent threat (APT) is widely acknowledged to be the most sophisticated and
potent class of security threat. APT refers to knowledgeable human attackers that are …
potent class of security threat. APT refers to knowledgeable human attackers that are …
The role of user behaviour in improving cyber security management
Information security has for long time been a field of study in computer science, software
engineering, and information communications technology. The term 'information security'has …
engineering, and information communications technology. The term 'information security'has …
Three decades of deception techniques in active cyber defense-retrospect and outlook
L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …
paper, we review representative techniques in honeypots, honeytokens, and moving target …
A large-scale empirical study on the vulnerability of deployed iot devices
The Internet of Things (IoT) has become ubiquitous and greatly affected peoples' daily lives.
With the increasing development of IoT devices, the corresponding security issues are …
With the increasing development of IoT devices, the corresponding security issues are …
Flow based containerized honeypot approach for network traffic analysis: An empirical study
SC Sethuraman, TG Jadapalli, DPV Sudhakaran… - Computer Science …, 2023 - Elsevier
The world of connected devices has been attributed to applications that relied upon
multitude of devices to acquire and distribute data over extremely diverse networks. This …
multitude of devices to acquire and distribute data over extremely diverse networks. This …
Incorporating deception into cyberbattlesim for autonomous defense
Deceptive elements, including honeypots and decoys, were incorporated into the Microsoft
CyberBattleSim experimentation and research platform. The defensive capabilities of the …
CyberBattleSim experimentation and research platform. The defensive capabilities of the …
Leveraging computational intelligence techniques for defensive deception: a review, recent advances, open problems and future directions
With information systems worldwide being attacked daily, analogies from traditional warfare
are apt, and deception tactics have historically proven effective as both a strategy and a …
are apt, and deception tactics have historically proven effective as both a strategy and a …
Cyber expert feedback: Experiences, expectations, and opinions about cyber deception
KJ Ferguson-Walter, MM Major, CK Johnson… - Computers & …, 2023 - Elsevier
Human behavior is a critical, yet under-studied topic in cybersecurity. Among the techniques
used for cyber defense, for cyber deception, a better understanding of human perception …
used for cyber defense, for cyber deception, a better understanding of human perception …
D3GF: A study on optimal defense performance evaluation of drone-type moving target defense through game theory
S Seo, H Moon, S Lee, D Kim, J Lee, B Kim… - IEEE …, 2023 - ieeexplore.ieee.org
Based on the paradigm shift in modern warfare, ground forces conduct pilot operations of
wireless unmanned maneuvering systems, such as tactical drones, in the form of manned …
wireless unmanned maneuvering systems, such as tactical drones, in the form of manned …