Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber deception
biblio
Deep Learning for Cyber Deception in Wireless Networks
Submitted by grigby1 on Thu, 06/09/2022 - 1:33pm
deep learning
pubcrawl
resilience
Resiliency
Throughput
Scalability
military communication
wireless networks
Numerical models
Jamming
iobt
cyber deception
wireless security
Limiting
Human Factors
channel scheduling
biblio
Empirical Study on Reconnaissance Attacks in SDN-Aware Network for Evaluating Cyber Deception
Submitted by grigby1 on Tue, 03/01/2022 - 3:23pm
Penetration Testing
software-defined networking
SDN security
Scalability
Resiliency
resilience
reconnaissance attack
Reconnaissance
pubcrawl
Communications technology
network systems
Network reconnaissance
network architecture
Intrusion Detection
Distance measurement
cyber deception
Computer hacking
biblio
MTDCD: an MTD Enhanced Cyber Deception Defense System
Submitted by grigby1 on Tue, 02/22/2022 - 4:45pm
Network reconnaissance
control systems
cyber deception
information management
Metrics
moving target defense
network reconnaissance attack
network topology
Prototypes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
software-defined network
System performance
biblio
Integrated Proactive Defense for Software Defined Internet of Things under Multi-Target Attacks
Submitted by grigby1 on Mon, 08/02/2021 - 2:14pm
control systems
cyber deception
graphical security model
Internet of Things
Measurement
Metrics
moving target defense
network topology
pubcrawl
Scalability
security
Servers
visualization
biblio
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses
Submitted by grigby1 on Thu, 01/28/2021 - 12:13pm
Metrics
tools
stealthy attackers
Scalability
Resiliency
resilience
Reconnaissance
quantitative framework
pubcrawl
persistent cyber adversaries
passive reconnaissance techniques
Organizations
network reconnaissance capabilities
model reconnaissance
military computing
Network reconnaissance
Knowledge engineering
Human behavior
foothold
Electronic mail
defensive capabilities
deception-based defenses
cyber deception
critical capability
Computer worms
computer network security
Computer crime
Adversary Models
advanced adversaries
biblio
Game theoretic modeling of cyber deception in the Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 1:59pm
Internet of battlefield things
security of data
security counter measure
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Monitoring
IoBT systems
IoBT control
iobt
Internet of Things
battlefield services
internet
information technology
Human Factors
Games
game theory
game theoretic modeling
cyberattack
cyber deception
Computational modeling
command and control systems
command and control
biblio
Learning about Cyber Deception through Simulations: Predictions of Human Decision Making with Deceptive Signals in Stackelberg Security Games
Submitted by willirn1 on Tue, 09/24/2019 - 10:40am
Cognitive Security
Cognitive Security in Cyber
cyber deception
simulations
Human Decision Making
Stackelberg Security Game
biblio
Artificial Intelligence and Game Theory Models for Defending Critical Networks with Cyber Deception
Submitted by willirn1 on Fri, 09/20/2019 - 3:29pm
Cognitive Security
Cognitive Security in Cyber
AI
Artificial Intelligence
game theory
critical network functions
cyber deception
biblio
Towards Personalized Deceptive Signaling for Cyber Defense Using Cognitive Models
Submitted by Katie Dey on Fri, 09/13/2019 - 8:12pm
cyber deception
cognitive models
Instance-based learning
knowledge-tracing
model-tracing
Cognitive Security
Articles of Interest
Track Materials
C3E 2019
biblio
General-Sum Cyber Deception Games under Partial Attacker Valuation Information
Submitted by willirn1 on Thu, 09/12/2019 - 3:38pm
Articles of Interest
C3E 2019
Cognitive Security
Cognitive Security in Cyber
cyber deception
Partial Attacker Valuation
Cognitive Security
Articles of Interest
C3E 2019
1
2
next ›
last »