-
2
-
-
84885575254
-
Scalability, fidelity, and containment in the Potemkin Virtual Honeyfarm
-
Brighton UK
-
M. Vrable, J. Ma, J. Chen, D. Moore, E Vadekieft, A. Snoeren, G. Voelker, and S. Savage, "Scalability, fidelity, and containment in the Potemkin Virtual Honeyfarm", Proc. ACM Symposium on Operating Systems Principles, Brighton UK, 148-162, 2005.
-
(2005)
Proc. ACM Symposium On Operating Systems Principles
, pp. 148-162
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vadekieft, E.5
Snoeren, A.6
Voelker, G.7
Savage, S.8
-
3
-
-
2342564023
-
The honeynet arms race
-
November/December
-
B. McCarty, "The honeynet arms race," IEEE Security and Privacy, 1(6), pp. 79-82, November/December 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.6
, pp. 79-82
-
-
McCarty, B.1
-
5
-
-
0002249231
-
-
London, UK: Cambridge University Press
-
P. Sztompka, Trust. London, UK: Cambridge University Press, 1999.
-
(1999)
Trust
-
-
Sztompka, P.1
-
6
-
-
0033282572
-
A concept for strategic cyber defense
-
Atlantic City, NJ, October
-
W. Tirenin and D. Faatz, "A concept for strategic cyber defense," Proc. Conf. on Military Communications, Atlantic City, NJ, Vol. 1, pp. 458-463, October 1999.
-
(1999)
Proc. Conf. On Military Communications
, vol.1
, pp. 458-463
-
-
Tirenin, W.1
Faatz, D.2
-
9
-
-
84896280244
-
A Taxonomy of Deception In Cyberspace
-
International Conference on Information Warfare and Security, March
-
N. Rowe, "A taxonomy of deception in cyberspace," International Conference on Information Warfare and Security, Princess Anne, MD, pp. 173-181, March 2006.
-
(2006)
Princess Anne, MD
, pp. 173-181
-
-
Rowe, N.1
-
10
-
-
2342615538
-
Anti-honeypot technology
-
Jan.-Feb
-
N. Krawetz, "Anti-honeypot technology," IEEE Security and Privacy, 2(1), pp. 76-79, Jan.-Feb. 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.1
, pp. 76-79
-
-
Krawetz, N.1
-
11
-
-
36949035998
-
On recognizing virtual honeypots and countermeasures
-
Indianapolis, Indiana, September
-
X. Fu, W. Yu, D. Cheng, X. Tan, K. Streff, & S. Graham, "On recognizing virtual honeypots and countermeasures," Proc. 2nd IEEE International Symposium on Dependable, Autonomic, and Secure Computing, Indianapolis, Indiana, pp. 211-218, September 2006.
-
(2006)
Proc. 2nd IEEE International Symposium On Dependable, Autonomic, and Secure Computing
, pp. 211-218
-
-
Fu, X.1
Yu, W.2
Cheng, D.3
Tan, X.4
Streff, K.5
Graham, S.6
-
12
-
-
15944399365
-
NoSEBrEaK - attacking honeynets
-
West Point, NY, June
-
M. Dornseif, T. Holz, and C. Klein, "NoSEBrEaK - attacking honeynets," Proc. IEEE Workshop on Information Assurance and Security, West Point, NY, 1555, June 2004.
-
(2004)
Proc. IEEE Workshop On Information Assurance and Security
, pp. 1555
-
-
Dornseif, M.1
Holz, T.2
Klein, C.3
-
13
-
-
33745434223
-
Detecting honeypots and other suspicious environments
-
West Point, NY, June
-
T. Holz and F. Raynal, "Detecting honeypots and other suspicious environments," Proc. 6th SMC Information Assurance Workshop, West Point, NY, pp. 29-36, June 2005.
-
(2005)
Proc. 6th SMC Information Assurance Workshop
, pp. 29-36
-
-
Holz, T.1
Raynal, F.2
-
16
-
-
33645294375
-
Experiments on robustness and deception in a coalition formation model
-
M. Belmonte, R. Conejo, J. Perez-De-La-Cruz, and F. Triguero, "Experiments on robustness and deception in a coalition formation model," Concurrency and Computation: Practice & Experience, Vol. 18, no. 4, pp. 371-386. 2006.
-
(2006)
Concurrency and Computation: Practice & Experience
, vol.18
, Issue.4
, pp. 371-386
-
-
Belmonte, M.1
Conejo, R.2
Perez-De-La-Cruz, J.3
Triguero, F.4
-
17
-
-
4544310772
-
Strategic deception in agents
-
New York, NY
-
D. Christian and R. C. Young, "Strategic deception in agents," Proc. 3rd Intl. Joint Conference on Autonomous Agents and Multiagent Systems, New York, NY, pp. 218-226, 2004.
-
(2004)
Proc. 3rd Intl. Joint Conference On Autonomous Agents and Multiagent Systems
, pp. 218-226
-
-
Christian, D.1
Young, R.C.2
-
20
-
-
3843119704
-
Cognitive factors in deception and counterdeception
-
ed. Daniel, D., & Herbig, K., New York: Pergamon
-
R. J. Heuer, "Cognitive factors in deception and counterdeception," in Strategic Military Deception, ed. Daniel, D., & Herbig, K., New York: Pergamon, 1982, pp. 31-69.
-
(1982)
Strategic Military Deception
, pp. 31-69
-
-
Heuer, R.J.1
-
21
-
-
10444223744
-
Toward Detecting Deception in Intelligent Systems
-
Orlando, Florida
-
E. Santos and G. Johnson, "Toward Detecting Deception in Intelligent Systems," Proc. SPIE Defense & Security Symposium, Vol. 5423, Orlando, Florida, 2004.
-
(2004)
Proc. SPIE Defense & Security Symposium
, vol.5423
-
-
Santos, E.1
Johnson, G.2
-
22
-
-
85138671305
-
Looking without seeing: Understanding unsophisticated consumers' success and failure to detect Internet deception
-
S. Grazioli and A. Wang, "Looking without seeing: understanding unsophisticated consumers' success and failure to detect Internet deception," Proc. 22nd Intl. Conf. on Information Systems, pp. 193-204, 2001.
-
(2001)
Proc. 22nd Intl. Conf. On Information Systems
, pp. 193-204
-
-
Grazioli, S.1
Wang, A.2
-
23
-
-
70349674914
-
Trust and deception in mediated communication
-
Honolulu, HI
-
th Hawaii Intl. Conf. on System Sciences, Honolulu, HI, 44.1, 2003.
-
(2003)
th Hawaii Intl. Conf. On System Sciences
, vol.44
, Issue.1
-
-
Burgoon, J.1
Stoner, G.2
Bonito, J.3
Dunbar, N.4
-
25
-
-
84871561513
-
An Arsenal of Deceptions For INFOSEC
-
Project Memorandum, National Defense Research Institute, PM-1167-NSA, October
-
S. Gerwehr, J. Rothenberg, and R. H. Anderson, "An arsenal of deceptions for INFOSEC," Project Memorandum, National Defense Research Institute, Rand Corp., PM-1167-NSA, October 1999.
-
(1999)
Rand Corp
-
-
Gerwehr, S.1
Rothenberg, J.2
Anderson, R.H.3
-
26
-
-
33845944837
-
Identification of deliberately doctored text documents using frequent keyword chain (FKC) model
-
October
-
S. Kaza, S. Murthy, and G. Hu, "Identification of deliberately doctored text documents using frequent keyword chain (FKC) model," Proc. IEEE Intl. Conf. on Information Reuse and Integration, October 2003, pp. 398-405.
-
(2003)
Proc. IEEE Intl. Conf. On Information Reuse and Integration
, pp. 398-405
-
-
Kaza, S.1
Murthy, S.2
Hu, G.3
-
29
-
-
84896458708
-
Experiments With a Testbed For Automated Defensive Deception Planning For Cyber-attacks
-
Monterey CA, USA, March
-
N. C. Rowe, H.-C. Goh, S. L. Lim, and B. T. Duong, "Experiments with a testbed for automated defensive deception planning for cyber-attacks," 2nd International Conference in I-Warfare and Security, Monterey CA, USA, March 2007.
-
(2007)
2nd International Conference in I-Warfare and Security
-
-
Rowe, N.C.1
Goh, H.-C.2
Lim, S.L.3
Duong, B.T.4
-
30
-
-
14944369649
-
Characteristics of Internet background radiation
-
Taormina, IT
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson, "Characteristics of Internet background radiation," Proc. 4th ACM SIGCOMM Conference on Internet Measurement, Taormina, IT, pp. 27-40, 2004.
-
(2004)
Proc. 4th ACM SIGCOMM Conference On Internet Measurement
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
|