Cited By
View all- Zambianco MFacchinetti CSiracusa D(2025)A Proactive Decoy Selection Scheme for Cyber Deception using MITRE ATT&CKComputers & Security10.1016/j.cose.2024.104144148(104144)Online publication date: Jan-2025
- Kulbacki MChaczko ZBarton SWajs-Chaczko PNikodem JRozenblit JKlempous RIto AKulbacki M(2024)A Review of the Weaponization of IoT: Security Threats and Countermeasures2024 IEEE 18th International Symposium on Applied Computational Intelligence and Informatics (SACI)10.1109/SACI60582.2024.10619778(000279-000284)Online publication date: 23-May-2024
- von der Assen JCeldrán ASefa RStiller BBovet G(2024)MTFS: a Moving Target Defense-Enabled File System for Malware Mitigation2024 IEEE 49th Conference on Local Computer Networks (LCN)10.1109/LCN60385.2024.10639803(1-6)Online publication date: 8-Oct-2024
- Show More Cited By