ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2104.03594
  4. Cited By
Three Decades of Deception Techniques in Active Cyber Defense --
  Retrospect and Outlook

Three Decades of Deception Techniques in Active Cyber Defense -- Retrospect and Outlook

8 April 2021
Li Zhang
V. Thing
ArXiv (abs)PDFHTML

Papers citing "Three Decades of Deception Techniques in Active Cyber Defense -- Retrospect and Outlook"

8 / 8 papers shown
Title
Koney: A Cyber Deception Orchestration Framework for Kubernetes
Koney: A Cyber Deception Orchestration Framework for Kubernetes
Mario Kahlhofer
Matteo Golinelli
Stefan Rass
OffRL
235
0
0
03 Apr 2025
Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception
  Techniques with Code-based Questionnaires
Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires
Mario Kahlhofer
Stefan Achleitner
Stefan Rass
René Mayrhofer
67
2
0
20 Aug 2024
HoneyGAN Pots: A Deep Learning Approach for Generating Honeypots
HoneyGAN Pots: A Deep Learning Approach for Generating Honeypots
Ryan Gabrys
Daniel Silva
Mark Bilinski
GAN
60
0
0
10 Jul 2024
Application Layer Cyber Deception without Developer Interaction
Application Layer Cyber Deception without Developer Interaction
Mario Kahlhofer
Stefan Rass
OffRL
72
3
0
21 May 2024
Towards in-situ Psychological Profiling of Cybercriminals Using
  Dynamically Generated Deception Environments
Towards in-situ Psychological Profiling of Cybercriminals Using Dynamically Generated Deception Environments
Jacob Quibell
21
1
0
19 May 2024
A Proactive Decoy Selection Scheme for Cyber Deception using MITRE
  ATT&CK
A Proactive Decoy Selection Scheme for Cyber Deception using MITRE ATT&CK
Marco Zambianco
C. Facchinetti
Domenico Siracusa
46
1
0
19 Apr 2024
Learning About Simulated Adversaries from Human Defenders using
  Interactive Cyber-Defense Games
Learning About Simulated Adversaries from Human Defenders using Interactive Cyber-Defense Games
Baptiste Prébot
Yinuo Du
Cleotilde Gonzalez
AAML
46
5
0
03 Apr 2023
Resource-aware Cyber Deception for Microservice-based Applications
Resource-aware Cyber Deception for Microservice-based Applications
Marco Zambianco
C. Facchinetti
Roberto Doriguzzi-Corin
Domenico Siracusa
40
2
0
06 Mar 2023
1