Cyber Deception for Computer and Network Security: Survey and Challenges.
Zhuo LuCliff WangShangqing ZhaoPublished in: CoRR (2020)
Keyphrases
- network security
- cyber security
- intrusion detection
- computer networks
- traffic analysis
- intrusion detection system
- computer systems
- risk assessment
- security breaches
- network traffic
- computer security
- dos attacks
- information security
- anomaly detection
- security policies
- network intrusion
- critical infrastructure
- anti phishing
- smart grid
- packet filtering
- situation assessment
- real world
- cyber attacks
- network administrators
- security protection
- real time
- cloud computing
- data processing