Login / Signup
Application Layer Cyber Deception without Developer Interaction.
Mario Kahlhofer
Stefan Rass
Published in:
CoRR (2024)
Keyphrases
</>
application layer
end to end
network layer
video streaming
source code
physical layer
transport layer
ddos attacks
bandwidth allocation
cross layer
social networks
overlay network
user interaction
low complexity
image data
end users
computer vision