有恶臭 发表于 2025-3-23 11:30:56

http://image.papertrans.cn/b/image/166770.jpg

faucet 发表于 2025-3-23 14:14:17

https://doi.org/10.1007/978-3-030-02110-8cyber deception; deception metrics; deep learning; adversarial cyber deception; differential privacy; dec

表否定 发表于 2025-3-23 18:34:56

http://reply.papertrans.cn/17/1668/166770/166770_13.png

气候 发表于 2025-3-23 23:33:39

http://reply.papertrans.cn/17/1668/166770/166770_14.png

弯曲的人 发表于 2025-3-24 04:52:53

http://reply.papertrans.cn/17/1668/166770/166770_15.png

Incommensurate 发表于 2025-3-24 10:20:32

William J. Lenhart,Giuseppe Liottaigence collectors. Honeypot deception can be made more effective when applied with variety. We discuss the range of deception tactics of which honeypots can take advantage. Ideas can come from deception theory, and honeypot deceptions can benefit from planning and experimentation.

Ascendancy 发表于 2025-3-24 12:11:29

Genus, Treewidth, and Local Crossing Numberr adversaries that try to discover and exploit vulnerabilities. To improve cyber agility of networks, the NetShifter performs multi-dimensional network-level adaptive defense in full scale beyond physical constraints of the networks by adopting the software-defined network (SDN).

缩减了 发表于 2025-3-24 16:55:54

http://reply.papertrans.cn/17/1668/166770/166770_18.png

CEDE 发表于 2025-3-24 20:02:30

http://reply.papertrans.cn/17/1668/166770/166770_19.png

大骂 发表于 2025-3-25 02:32:56

http://reply.papertrans.cn/17/1668/166770/166770_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Autonomous Cyber Deception; Reasoning, Adaptive Ehab Al-Shaer,Jinpeng Wei,Cliff Wang Textbook 2019 Springer Nature Switzerland AG 2019 cyb