Author of the publication

Retrospectively Using Multilayer Deception in Depth Against Advanced Persistent Threats.

, , and . HICSS, page 944-953. ScholarSpace, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distinguishing the Picture Captions on the World Wide Web (Poster)., and . ACM DL, page 263. ACM, (1997)Logical Modeling of Deceptive Negative Persuasion.. PERSUASIVE, volume 4744 of Lecture Notes in Computer Science, page 105-108. Springer, (2007)Path planning by optimal-path-map construction for homogeneous-cost two-dimensional regions., and . ICRA, page 1924-1929. IEEE, (1990)Memory Forensics and the Macintosh OS X Operating System., , and . ICDF2C, volume 216 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 175-180. Springer, (2017)Experiments with Deceptive Software Responses to Buffer-Based Attacks., , and . IAW, page 43-44. IEEE, (2003)Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus., and . ICDF2C, volume 88 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 115-130. Springer, (2011)Rule-based statistical calculations on a database abstract.. Stanford University, USA, (1983)Top-Down Statistical Estimation on a Database.. SIGMOD Conference, page 135-145. ACM Press, (1983)SIGMOD Record 13(4).Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques., and . NCS, volume 310 of Lecture Notes in Networks and Systems, page 110-123. Springer, (2021)Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace.. AINA Workshops (1), page 563-568. IEEE Computer Society, (2007)