Login / Signup
Honeypot Allocation over Attack Graphs in Cyber Deception Games.
Ahmed H. Anwar
Charles A. Kamhoua
Nandi Leslie
Published in:
ICNC (2020)
Keyphrases
</>
attack graphs
attack graph
network configuration
resource allocation
game theory
incomplete information
cyber security
real time
alert correlation
unsupervised learning
attack scenarios