Sign in

A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During Cyber-Attacks.

Olayiwola Tokunbo TaofeekMoatsum AlawidaAbdulatif AlabdulatifAbiodun Esther OmolaraOludare Isaac Abiodun
Published in: IEEE Access (2022)
Keyphrases
  • network structure
  • data analysis
  • data collection
  • original data
  • data sources
  • knowledge discovery
  • data mining techniques
  • computer systems
  • wireless networks
  • decision making
  • low cost
  • data processing