共 50 条
- [41] Deception Tree Model for Cyber Operation [J]. 2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2019, : 135 - 138
- [42] Elements of strategic denial and deception [J]. Trends in Organized Crime, 2000, 6 (1) : 17 - 31
- [43] Cyber Deception via System Manipulation [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 194 - 201
- [44] Deception for Cyber Defence: Challenges and Opportunities [J]. 2021 THIRD IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2021), 2021, : 173 - 182
- [45] Deception Planning Models for Cyber Security [J]. PROCEEDINGS OF THE 2017 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2017), 2017,
- [46] Cyber Deception: Overview and the Road Ahead [J]. IEEE SECURITY & PRIVACY, 2018, 16 (02) : 80 - 85
- [48] The use of strategic deception in relationships [J]. JOURNAL OF SERVICES MARKETING, 2009, 23 (05) : 318 - 325
- [49] Another strategic deception initiative [J]. BULLETIN OF THE ATOMIC SCIENTISTS, 1997, 53 (02) : 22 - 23
- [50] ACyDS: An Adaptive Cyber Deception System [J]. MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 800 - 805