2019 IEEE International Symposium on Technologies for Homeland Security (HST) 2019
DOI: 10.1109/hst47167.2019.9032927
|View full text |Cite
|
Sign up to set email alerts
|

Model-driven Deception for Control System Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…Hofer et al [72] discussed the attributes of cyber-physical decoys to design a system with these attributes to develop deception decoys. The authors integrated the deception decoys into real systems to make them harder to detect and more appealing as targets.…”
Section: Pros and Consmentioning
confidence: 99%
See 4 more Smart Citations
“…Hofer et al [72] discussed the attributes of cyber-physical decoys to design a system with these attributes to develop deception decoys. The authors integrated the deception decoys into real systems to make them harder to detect and more appealing as targets.…”
Section: Pros and Consmentioning
confidence: 99%
“…• Advanced persistent threats (APT) [48,72,75,87,105,106,124]: An APT attack is the most well-known sophisticated attack performing different types of attacks in the stages of the cyber kill chain (CKC) [103]. In particular, gametheoretic defensive deception research has considered the APT attack but mostly focused on the attacks during the reconnaissance stage.…”
Section: Attacks Countermeasured By Defensive Deception Techniquesmentioning
confidence: 99%
See 3 more Smart Citations