메뉴 건너뛰기




Volumn 367, Issue , 2011, Pages 3-18

Using deception to shield cyberspace sensors

Author keywords

Cyberspace sensors; Deception; Sensor shielding

Indexed keywords

COMPUTERS; ELECTRIC POWER TRANSMISSION NETWORKS; PUBLIC WORKS; SHIELDING;

EID: 84905228440     PISSN: 18684238     EISSN: 1868422X     Source Type: Book Series    
DOI: 10.1007/978-3-642-24864-1_1     Document Type: Conference Paper
Times cited : (7)

References (17)
  • 4
    • 84958775763 scopus 로고    scopus 로고
    • as Amended, Classified National Security Information, The White House, Washington, DC
    • G. Bush, Executive Order 13292 – Further Amendment to Executive Order 12958, as Amended, Classified National Security Information, The White House, Washington, DC (www.archives.gov/isoo/policy-documents/eo-12958-amendment.pdf), 2003.
    • (2003) Executive Order 13292 – Further Amendment to Executive Order 12958
    • Bush, G.1
  • 5
  • 6
    • 0010646470 scopus 로고
    • Tactical deception in air-land warfare
    • C. Fowler and R. Nesbit, Tactical deception in air-land warfare, Journal of Electronic Defense, vol. 18(6), pp. 37–79, 1995.
    • (1995) Journal of Electronic Defense , vol.18 , Issue.6 , pp. 37-79
    • Fowler, C.1    Nesbit, R.2
  • 10
    • 84969333526 scopus 로고    scopus 로고
    • The use and abuse of intelligence: An intelligence provider’s perspective
    • E. Poteat, The use and abuse of intelligence: An intelligence provider’s perspective, Diplomacy and Statecraft, vol. 11(2), pp. 1–16, 2000.
    • (2000) Diplomacy and Statecraft , vol.11 , Issue.2 , pp. 1-16
    • Poteat, E.1
  • 13
    • 21644437899 scopus 로고    scopus 로고
    • Two taxonomies of deception for attacks on information systems
    • N. Rowe and H. Rothstein, Two taxonomies of deception for attacks on information systems, Journal of Information Warfare, vol. 3(2), pp.27–39, 2004.
    • (2004) Journal of Information Warfare , vol.3 , Issue.2 , pp. 27-39
    • Rowe, N.1    Rothstein, H.2
  • 15
    • 82155189916 scopus 로고    scopus 로고
    • Joint Publication 3-13.4, Washington, DC
    • United States Department of Defense, Military Deception, Joint Publication 3-13.4, Washington, DC, 2006.
    • (2006) Military Deception
  • 16
    • 70350026813 scopus 로고    scopus 로고
    • Using deception to hide things from hackers: Processes, principles, and techniques
    • J. Yuill, D. Denning and F. Feer, Using deception to hide things from hackers: Processes, principles, and techniques, Journal of Information Warfare, vol. 5(3), pp. 26–40, 2006.
    • (2006) Journal of Information Warfare , vol.5 , Issue.3 , pp. 26-40
    • Yuill, J.1    Denning, D.2    Feer, F.3
  • 17
    • 84969326772 scopus 로고    scopus 로고
    • Designing deception operations for computer network defense
    • J. Yuill, F. Feer and D. Denning, Designing deception operations for computer network defense, Proceedings of the DoD Cyber Crime Conference (www.jimyuill.com/research-papers/DoD-Cyber-Crime-deceptionprocess.pdf), 2005.
    • (2005) Proceedings of the Dod Cyber Crime Conference
    • Yuill, J.1    Feer, F.2    Denning, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.