Cited By
View all- Zhang LThing V(2021)Three decades of deception techniques in active cyber defense - Retrospect and outlookComputers and Security10.1016/j.cose.2021.102288106:COnline publication date: 1-Jul-2021
- Huang CHan JZhang XLiu J(2019)Automatic Identification of Honeypot Server Using Machine Learning TechniquesSecurity and Communication Networks10.1155/2019/26276082019Online publication date: 1-Jan-2019
- Papazis KChilamkurti N(2019)Detecting indicators of deception in emulated monitoring systemsService Oriented Computing and Applications10.1007/s11761-018-0252-213:1(17-29)Online publication date: 1-Mar-2019
- Show More Cited By