Skip to main content

previous disabled Page of 2
and
  1. No Access

    Book

  2. No Access

    Book

    Cyber Deception

    Techniques, Strategies, and Human Aspects

    Tiffany Bao, Milind Tambe, Cliff Wang in Advances in Information Security (2023)

  3. Chapter

    Correction to: Autonomous Cyber Deception

    This book was inadvertently published as an authored work with the chapter authors mentioned in the footnotes of the chapter opening pages. This has now been updated and the chapter authors have been mentioned...

    Ehab Al-Shaer, **peng Wei, Kevin W. Hamlen, Cliff Wang in Autonomous Cyber Deception (2019)

  4. No Access

    Book

  5. No Access

    Book

  6. No Access

    Chapter

    Computer-Aided Human Centric Cyber Situation Awareness

    In this chapter, we provide an overview of Cyber Situational Awareness, an emerging research area in the broad field of cyber security, and discuss, at least at a high level, how to gain Cyber Situation Awaren...

    Massimiliano Albanese, Nancy Cooke in Theory and Models for Cyber Situation Awar… (2017)

  7. No Access

    Book

    Cyber Deception

    Building the Scientific Foundation

    Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup (2016)

  8. No Access

    Book

  9. No Access

    Chapter

    Introduction

    Authentication of a user or a device is absolutely essential before it can be allowed access to critical and protected resources or services. Most of the existing fingerprint-based authentication systems have ...

    Yong Guan, Sneha Kumar Kasera, Cliff Wang, Ryan M. Gerdes in Digital Fingerprinting (2016)

  10. No Access

    Chapter

    Conclusion

    We identify a series of research questions for further work in the broad area of fingerprinting.

    Yong Guan, Sneha Kumar Kasera, Cliff Wang, Ryan M. Gerdes in Digital Fingerprinting (2016)

  11. No Access

    Chapter

    A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks

    In many wireless networks (e.g., tactical military networks), the one-to-multiple communication model is pervasive due to commanding and control requirements in mission operations. In these networks, the roles...

    Zhuo Lu, Cliff Wang, Mingkui Wei in Cyber Deception (2016)

  12. No Access

    Book

  13. No Access

    Book

  14. No Access

    Chapter

    Modeling the Impact of Jamming Attacks on Time-Critical Traffic with Applications to Smart Grid

    In this chapter, we aim at modeling and detecting jamming attacks against time-critical wireless networks with applications to the smart grid. In contrast to communication networks where packets-oriented metri...

    Zhuo Lu, Wenye Wang, Cliff Wang in Modeling and Evaluating Denial of Service … (2015)

  15. No Access

    Chapter

    Understanding the Resilience of Mobile Cloud Services to Malware

    In this chapter, we aim to measure the resilience of mobile cloud services to malware. Since the cloud is intended to provide real-time services to mobile users, we introduce a new metric, resilience factor, to d...

    Zhuo Lu, Wenye Wang, Cliff Wang in Modeling and Evaluating Denial of Service … (2015)

  16. No Access

    Chapter

    Modeling and Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks

    With the advancement with flexible and configurable wireless adapters, it becomes feasible for a node to modify its low-layer (e.g. physical or MAC layer) parameters, which can substantially affect the network...

    Zhuo Lu, Wenye Wang, Cliff Wang in Modeling and Evaluating Denial of Service … (2015)

  17. No Access

    Chapter

    Minimizing Message Delay of Time-Critical Traffic for Wireless Smart Grid Applications Under Jamming

    In the previous chapter, we offered a comprehensive study on modeling and detecting jamming attacks against time-critical wireless networks with applications to the smart grid. However, only modeling and detec...

    Zhuo Lu, Wenye Wang, Cliff Wang in Modeling and Evaluating Denial of Service … (2015)

  18. No Access

    Book

  19. No Access

    Book

  20. No Access

    Book

previous disabled Page of 2