Results (1)
Search Parameters:
Author/Affiliation: Hans Dieter SchottenTowards Deployment Strategies for Deception Systems
Advances in Science, Technology and Engineering Systems Journal,
Volume 2,
Issue 3,
Page # 1272–1279,
2017;
DOI: 10.25046/aj0203161
Abstract:
Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…
Read More(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
