Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,756 papers from all fields of science
Search
Sign In
Create Free Account
Deception technology
Overview Deception technology is an emerging category of cyber security defense. Deception technology can rapidly detect, analyze, and defend against…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Honeypot (computing)
Internet of things
Broader (1)
Internet security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Legal Issues of Deception Systems in the Industrial Control Systems
Pavol Sokol
,
Radoslav Benko
,
L. Rózenfeldová
Recent Developments on Industrial Control Systems…
2019
Corpus ID: 211464180
Deception systems, and within them deception industrial control systems, present a newly emerging type of defence in…
Expand
2018
2018
Deception Based Cyber Attacks Detection Framework for Multiple Public Facing Internet Servers
Muhammad Ismail
,
Jiang Wang
2018
Corpus ID: 67849472
With the passage of time, cyber threats and attacks are becoming more and more sophisticated and are continually evolving at an…
Expand
2018
2018
Deception Technology: A Method to Reduce the Attack Exposure Time of a SCADA System
M. Arshad
,
T. Patel
,
Hisham A. Kholidy
,
Advisor
2018
Corpus ID: 196003075
Exposure Time of a SCADA System Mohammad Arshad and Tirth Patel Network and Computer Security Department Advisor: Dr. Hisham A…
Expand
2018
2018
Domain Specific Honeytokens Based on Natural Language Processing - A Conceptual Model
Tomislav Turek
,
M. Schatten
,
Tonimir Kisasondi
2018
Corpus ID: 59042770
This paper presents the idea and conceptual model for keyword modelling by using Natural Language Processing (NLP) in a specific…
Expand
2017
2017
The Research on Time Synchronize Security Technology for Electric Power System Based on Beidou
Yu Ning
,
Wu Hanwei
,
Qiu Zuxiong
,
Mai Guangxin
International Conference on Computer Systems…
2017
Corpus ID: 52115618
The events of sequence and information application system in electric power system need uniqueness and accuracy, precise…
Expand
2012
2012
Research on Defense In-depth Model of Information Network Confrontation
Shengjian Liu
,
Ping Zhang
,
Huyuan Sun
Fourth International Conference on Computational…
2012
Corpus ID: 15752716
According to the specific demand of the construction of the information network confrontation defense system, this paper proposes…
Expand
2009
2009
Experiment Research of Automatic Deception Model Based on Autonomic Computing
Bingyang Li
,
Huiqiang Wang
,
Guangsheng Feng
2009
Corpus ID: 59667920
Aiming at the fact that the network deception technology needs manual work and can’t ensure deception efficiency and accuracy, an…
Expand
2009
2009
Modeling and Analyzing Dynamic Forensics System Based on Intrusion Tolerance
Lin Chen
,
Zhitang Li
,
C. Gao
,
Yingshu Liu
Ninth IEEE International Conference on Computer…
2009
Corpus ID: 15124575
As an important part of computer forensics, network forensics particularly places emphasis on dynamic network information…
Expand
2003
2003
Research and Implement of Deception Environment in Intrusion Deception Technology
Wu Zhen
2003
Corpus ID: 64010467
The emergence of Intrusion Deception technology turns passive defense into active defense.The deception environment is the…
Expand
2002
2002
Honeytraps , A Network Forensic Tool ( Paper Draft )
Yanet Manzano
2002
Corpus ID: 18178060
Two new fields within Communication Systems and Networks, born in the practioner realm, have quietly grown in importance in the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE