Title
Cyber Range for Research-Inspired Learning of “Attack Defense by Pretense” Principle and Practice
Abstract
There is an increasing trend in cloud adoption of enterprise applications in, for example, manufacturing, healthcare, and finance. Such applications are routinely subject to targeted cyberattacks, which result in significant loss of sensitive data (e.g., due to data exfiltration in advanced persistent threats) or valuable utilities (e.g., due to resource the exfiltration of power in cryptojacking)...
Year
DOI
Venue
2021
10.1109/TLT.2021.3091904
IEEE Transactions on Learning Technologies
Keywords
DocType
Volume
Cloud computing,Computer crime,Training,Tools,Task analysis,Virtual machining,Scalability
Journal
14
Issue
ISSN
Citations 
3
1939-1382
0
PageRank 
References 
Authors
0.34
0
6
Name
Order
Citations
PageRank
Komal Bhupendra Vekaria100.34
Prasad Calyam200.34
Songjie Wang300.34
Ramya Payyavula400.34
Matthew Rockey500.34
Nafis Ahmed600.34