ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.06196
  4. Cited By
Demystifying Deception Technology:A Survey

Demystifying Deception Technology:A Survey

17 April 2018
Daniel Fraunholz
S. D. Antón
Christoph Lipps
Daniel Reti
Daniel Krohmer
Frederic Pohl
Matthias Tammen
Hans D. Schotten
ArXivPDFHTML

Papers citing "Demystifying Deception Technology:A Survey"

10 / 10 papers shown
Title
Koney: A Cyber Deception Orchestration Framework for Kubernetes
Koney: A Cyber Deception Orchestration Framework for Kubernetes
Mario Kahlhofer
Matteo Golinelli
Stefan Rass
OffRL
59
0
0
03 Apr 2025
Physical Layer Deception with Non-Orthogonal Multiplexing
Physical Layer Deception with Non-Orthogonal Multiplexing
Wenwen Chen
Bin Han
Yao Zhu
Anke Schmeink
Giuseppe Caire
Hans D. Schotten
63
2
0
28 Jan 2025
VENENA: A Deceptive Visual Encryption Framework for Wireless Semantic Secrecy
VENENA: A Deceptive Visual Encryption Framework for Wireless Semantic Secrecy
Bin Han
Ye Yuan
Hans D. Schotten
36
0
0
18 Jan 2025
Physical Layer Deception in OFDM Systems
Physical Layer Deception in OFDM Systems
Wenwen Chen
Bin Han
Yao Zhu
Anke Schmeink
Hans D. Schotten
37
0
0
06 Nov 2024
SCANTRAP: Protecting Content Management Systems from Vulnerability
  Scanners with Cyber Deception and Obfuscation
SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation
Daniel Reti
Karina Elzer
Hans D. Schotten
23
3
0
25 Jan 2023
An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy
An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy
Daniel Fraunholz
Marc Zimmermann
Hans D. Schotten
17
44
0
06 Nov 2021
Incorporating Deception into CyberBattleSim for Autonomous Defense
Incorporating Deception into CyberBattleSim for Autonomous Defense
Erich Walter
Kimberly J. Ferguson-Walter
Ahmad Ridley
28
23
0
31 Aug 2021
Strategically-Motivated Advanced Persistent Threat: Definition, Process,
  Tactics and a Disinformation Model of Counterattack
Strategically-Motivated Advanced Persistent Threat: Definition, Process, Tactics and a Disinformation Model of Counterattack
Atif Ahmad
Jeb Webb
K. Desouza
James Boorman
11
114
0
27 Mar 2021
Towards Identifying Human Actions, Intent, and Severity of APT Attacks
  Applying Deception Techniques -- An Experiment
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques -- An Experiment
Joel Chacon
Sean McKeown
Richard Macfarlane
19
3
0
02 Jun 2020
A Survey on Honeypot Software and Data Analysis
A Survey on Honeypot Software and Data Analysis
Marcin Nawrocki
Matthias Wählisch
T. Schmidt
Christian Keil
Jochen Schönfelder
51
155
0
22 Aug 2016
1