Title | ||
---|---|---|
Cyber Range for Research-Inspired Learning of “Attack Defense by Pretense” Principle and Practice |
Abstract | ||
---|---|---|
There is an increasing trend in cloud adoption of enterprise applications in, for example, manufacturing, healthcare, and finance. Such applications are routinely subject to targeted cyberattacks, which result in significant loss of sensitive data (e.g., due to data exfiltration in advanced persistent threats) or valuable utilities (e.g., due to resource the exfiltration of power in cryptojacking)... |
Year | DOI | Venue |
---|---|---|
2021 | 10.1109/TLT.2021.3091904 | IEEE Transactions on Learning Technologies |
Keywords | DocType | Volume |
Cloud computing,Computer crime,Training,Tools,Task analysis,Virtual machining,Scalability | Journal | 14 |
Issue | ISSN | Citations |
3 | 1939-1382 | 0 |
PageRank | References | Authors |
0.34 | 0 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Komal Bhupendra Vekaria | 1 | 0 | 0.34 |
Prasad Calyam | 2 | 0 | 0.34 |
Songjie Wang | 3 | 0 | 0.34 |
Ramya Payyavula | 4 | 0 | 0.34 |
Matthew Rockey | 5 | 0 | 0.34 |
Nafis Ahmed | 6 | 0 | 0.34 |