-
1
المصدر: IEEE Access, Vol 9, Pp 49662-49682 (2021)
مصطلحات موضوعية: Power graph analysis, General Computer Science, Computer science, media_common.quotation_subject, cyber decoy, 0211 other engineering and technologies, 02 engineering and technology, Intrusion detection system, cyber defense, Computer security, computer.software_genre, Phase (combat), lateral movement, 0202 electrical engineering, electronic engineering, information engineering, General Materials Science, Hidden Markov model, media_common, 021110 strategic, defence & security studies, General Engineering, Deception, Software deployment, Path (graph theory), intrusion detection system, 020201 artificial intelligence & image processing, lcsh:Electrical engineering. Electronics. Nuclear engineering, Cyber deception, Decoy, computer, lcsh:TK1-9971, hidden Markov Model
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::167c8fad8a95f08eea217e644c35c99dTest
https://ieeexplore.ieee.org/document/9387290Test/ -
2
المصدر: Modeling and Design of Secure Internet of Things
مصطلحات موضوعية: Computer science, media_common.quotation_subject, Deception, Computer security, computer.software_genre, computer, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::8669fd9cda9cb6210e17d248cd01afbeTest
https://doi.org/10.1002/9781119593386.ch7Test -
3
المصدر: Modeling and Design of Secure Internet of Things
مصطلحات موضوعية: Computer science, media_common.quotation_subject, Monte Carlo method, Observable, Statistical physics, Deception, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::313f7c4b9c3bc4c6e0a0ba6b5a7e3c4bTest
https://doi.org/10.1002/9781119593386.ch14Test -
4
المؤلفون: Laurent Njilla, Garegin Grigoryan, Charles A. Kamhoua, Yaoqing Liu
المصدر: Modeling and Design of Secure Internet of Things
مصطلحات موضوعية: Leverage (finance), business.industry, Computer science, media_common.quotation_subject, Deception, Internet of Things, business, Computer security, computer.software_genre, Software-defined networking, computer, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::cb2b4a01e39b9696be0ae339c0eca8f2Test
https://doi.org/10.1002/9781119593386.ch21Test -
5
المصدر: Modeling and Design of Secure Internet of Things
مصطلحات موضوعية: 021110 strategic, defence & security studies, Service (systems architecture), Computer science, business.industry, media_common.quotation_subject, 0211 other engineering and technologies, 020206 networking & telecommunications, Jamming, 02 engineering and technology, Computer security, computer.software_genre, Secrecy, 0202 electrical engineering, electronic engineering, information engineering, Trust management (information system), Quality (business), Spectrum sharing, Internet of Things, business, computer, media_common, Reputation
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::d3306d45977126373d88a7960bd1ca91Test
https://doi.org/10.1002/9781119593386.ch4Test -
6
المؤلفون: Laurent Njilla, Charles A. Kamhoua, Satyaki Nan, Swastik Brahma
المصدر: Modeling and Design of Secure Internet of Things
مصطلحات موضوعية: Computer science, business.industry, media_common.quotation_subject, Probabilistic logic, ComputingMilieux_LEGALASPECTSOFCOMPUTING, Deception, Computer security, computer.software_genre, Task (project management), symbols.namesake, Development (topology), Nash equilibrium, Node (computer science), symbols, Tree network, The Internet, business, computer, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::36ddf1f89b6d0875d06a3be5397edf10Test
https://doi.org/10.1002/9781119593386.ch6Test -
7
المؤلفون: Laurent Njilla, Jiawei Yuan
المصدر: INFOCOM Workshops
مصطلحات موضوعية: Reward system, Blockchain, Computer science, Reputation system, Distributed computing, Component (UML), Reliability (computer networking), media_common.quotation_subject, Mobile device, Software quality, Reputation, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::81c5e5d9ec42ec520e759e082dfb3af6Test
https://doi.org/10.1109/infocomwkshps51825.2021.9484514Test -
8
المصدر: Blockchain for Distributed Systems Security
مصطلحات موضوعية: Computer science, media_common.quotation_subject, Digital currency, Computer security, computer.software_genre, computer, Reputation, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::fab8ff12708ec74279ac1a95ee5bbd13Test
https://doi.org/10.1002/9781119519621.ch11Test -
9
المؤلفون: Laurent Njilla, Chin-Tser Huang, Tieming Geng
المصدر: ISC2
مصطلحات موضوعية: Blockchain, Computer science, media_common.quotation_subject, 020208 electrical & electronic engineering, Runtime verification, System safety, 02 engineering and technology, 021001 nanoscience & nanotechnology, Computer security, computer.software_genre, Counterfeit, 0202 electrical engineering, electronic engineering, information engineering, 0210 nano-technology, Merge (version control), computer, Reputation, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::5c8d2588e96d4b8391cd18a0df151f9eTest
https://doi.org/10.1109/isc251055.2020.9239061Test -
10
المؤلفون: Laurent Njilla, Jeman Park, Aziz Mohaisen, Michael J. Weisman, Charles A. Kamhoua, Nandi O. Leslie
المصدر: Information Security Applications ISBN: 9783030393021
WISAمصطلحات موضوعية: Exploit, Computer science, business.industry, media_common.quotation_subject, Vulnerability, Deception, Adversary, Computer security, computer.software_genre, Adversarial system, Software, Software deployment, Graph (abstract data type), The Internet, business, computer, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::1e5632f9d68141ea7c5a2abe359f4c3dTest
https://doi.org/10.1007/978-3-030-39303-8_23Test