Login / Signup

Honeypot Allocation over Attack Graphs in Cyber Deception Games.

Ahmed H. AnwarCharles A. KamhouaNandi Leslie
Published in: ICNC (2020)
Keyphrases
  • attack graphs
  • attack graph
  • network configuration
  • resource allocation
  • game theory
  • incomplete information
  • cyber security
  • real time
  • alert correlation
  • unsupervised learning
  • attack scenarios