five

Deception techniques in computer security

收藏
DataCite Commons2022-10-24 更新2025-04-16 收录
下载链接:
https://orkg.org/comparison/R225329/
下载链接
链接失效反馈
官方服务:
资源简介:
A recent trend both in academia and industry is to explore the use of deception techniques to achieve proactive attack detection and defense—to the point of marketing intrusion deception solutions as zero-false-positive intrusion detection. This is a comprehensive classification of existing solutions of deception techniques in computer security.
提供机构:
Open Research Knowledge Graph
创建时间:
2022-10-24
5,000+
优质数据集
54 个
任务类型
进入经典数据集
二维码
社区交流群

面向社区/商业的数据集话题

二维码
科研交流群

面向高校/科研机构的开源数据集话题

数据驱动未来

携手共赢发展

商业合作