Cited By
View all- Taofeek OAlawida MAlabdulatif AOmolara AAbiodun O(2022)A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During Cyber-AttacksIEEE Access10.1109/ACCESS.2022.316662810(41457-41476)Online publication date: 2022
- Mosayyebzadeh AMohan ATikale SAbdi MSchear NMunson CHudson TRudolph LCooperman GDesnoyers PKrieger ODan TDahlia M(2019)Supporting security sensitive tenants in a bare-metal cloudProceedings of the 2019 USENIX Conference on Usenix Annual Technical Conference10.5555/3358807.3358856(587-602)Online publication date: 10-Jul-2019
- Abazari FTakabi HAnaloui M(2019)Hacking and Countermeasures in the CloudSecurity, Privacy, and Digital Forensics in the Cloud10.1002/9781119053385.ch6(129-141)Online publication date: 8-Feb-2019
- Show More Cited By