obdurate 发表于 2025-3-21 16:27:52

书目名称Autonomous Cyber Deception影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0166770<br><br>        <br><br>书目名称Autonomous Cyber Deception影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0166770<br><br>        <br><br>书目名称Autonomous Cyber Deception网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0166770<br><br>        <br><br>书目名称Autonomous Cyber Deception网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0166770<br><br>        <br><br>书目名称Autonomous Cyber Deception被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0166770<br><br>        <br><br>书目名称Autonomous Cyber Deception被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0166770<br><br>        <br><br>书目名称Autonomous Cyber Deception年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0166770<br><br>        <br><br>书目名称Autonomous Cyber Deception年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0166770<br><br>        <br><br>书目名称Autonomous Cyber Deception读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0166770<br><br>        <br><br>书目名称Autonomous Cyber Deception读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0166770<br><br>        <br><br>

设施 发表于 2025-3-21 22:23:04

http://reply.papertrans.cn/17/1668/166770/166770_2.png

值得赞赏 发表于 2025-3-22 04:03:40

Patricia Bachmann,Ignaz Rutter,Peter Stumpfligent cyber deception systems. Such systems can dynamically plan the deception strategy and use several actuators to effectively implement the cyber deception measures. We also present a prototype of a framework designed to simplify the development of cyber deception tools to be integrated with such intelligent agents.

流利圆滑 发表于 2025-3-22 06:00:55

http://reply.papertrans.cn/17/1668/166770/166770_4.png

勉强 发表于 2025-3-22 11:35:56

http://reply.papertrans.cn/17/1668/166770/166770_5.png

愤慨一下 发表于 2025-3-22 13:05:34

Malware Deception with Automatic Analysis and Generation of HoneyResourceeving something. Towards this end, this chapter introduces our preliminary systematic study and a prototype system, ., for automatically extracting the system resource constraints from malware code and generating HoneyResource (e.g., malware vaccines) based on the system resource conditions.

glamor 发表于 2025-3-22 20:42:09

http://reply.papertrans.cn/17/1668/166770/166770_7.png

不整齐 发表于 2025-3-22 22:55:47

Lecture Notes in Computer Scienceeving something. Towards this end, this chapter introduces our preliminary systematic study and a prototype system, ., for automatically extracting the system resource constraints from malware code and generating HoneyResource (e.g., malware vaccines) based on the system resource conditions.

改良 发表于 2025-3-23 02:36:12

http://reply.papertrans.cn/17/1668/166770/166770_9.png

讨人喜欢 发表于 2025-3-23 06:24:08

Ehab Al-Shaer,Jinpeng Wei,Cliff WangProvides comprehensive coverage of adaptive cyber deception in many aspects, including theory and practice, sense-making and decision making, and network and system perspectives.Focuses on how to make
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Autonomous Cyber Deception; Reasoning, Adaptive Ehab Al-Shaer,Jinpeng Wei,Cliff Wang Textbook 2019 Springer Nature Switzerland AG 2019 cyb