共 11 条
- [1] Ben Salem M, 2011, LECT NOTES COMPUT SC, V6739, P35, DOI 10.1007/978-3-642-22424-9_3
- [2] Bowen BM, 2009, L N INST COMP SCI SO, V19, P51
- [4] Holland J.H., 1992, Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence, P1
- [5] Fake Document Generation for Cyber Deception by Manipulating Text Comprehensibility [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 835 - 845
- [7] Voris J., 2012, 2012 IEEE CS Security and Privacy Workshops (SPW 2012), P129, DOI 10.1109/SPW.2012.20
- [8] Generation and Distribution of Decoy Document System [J]. TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 123 - 129
- [9] Whitham Ben, 2013, International Journal of Cyber-Security and Digital Forensics, V2, P103
- [10] Whitham B, 2017, PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, P6069