Login / Signup
Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN Approach.
Toru Shimanaka
Ryusuke Masuoka
Brian Hay
Published in:
HICSS (2019)
Keyphrases
</>
real time
management system
incomplete information
countermeasures
data sets
neural network
information flow
cyber security
cyber attacks
cyber physical systems