Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Optimally Blending Honeypots into Production Networks: Hardness and Algorithms
Honeypot is an important cyber defense technique that can expose attackers’ new attacks (e.g., zero-day exploits). However, the effectiveness of honeypots has not been systematically investigated, beyond the r...
-
Chapter and Conference Paper
Computational Complexity Characterization of Protecting Elections from Bribery
The bribery problem in election has received considerable attention in the literature, upon which various algorithmic and complexity results have been obtained. It is thus natural to ask whether we can protect...