共 13 条
[1]
Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies
[J].
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT,
2017, 14 (04)
:1098-1112
[2]
Aggarwal Palvi, 2015, 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). Proceedings, P1, DOI 10.1109/CyberSA.2015.7166127
[3]
Aggarwal P., 2016, Advances in Human Factors in Cybersecurity. AISC, P85, DOI [DOI 10.1007/978-3-319-41932-9_8, DOI 10.1007/978-3-319-41932-9]
[4]
Aggarwal P, 2016, 2016 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA)
[5]
Aggarwal P, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS)
[6]
[Anonymous], P 1 INT C SIM TOOLS
[7]
[Anonymous], 2022, SECURITY GAME THEORY
[8]
[Anonymous], HDB COMPUTER NETWORK
[10]
Issariyakul Teerawat, 2009, INTRO NETWORK SIMULA, P1