Results 111 to 120 of about 264,857 (253)

WiP: Deception-in-Depth Using Multiple Layers of Deception [PDF]

open access: yesarXiv
Deception is being increasingly explored as a cyberdefense strategy to protect operational systems. We are studying implementation of deception-in-depth strategies with initially three logical layers: network, host, and data. We draw ideas from military deception, network orchestration, software deception, file deception, fake honeypots, and moving ...
arxiv  

OpenDeception: Benchmarking and Investigating AI Deceptive Behaviors via Open-ended Interaction Simulation [PDF]

open access: yesarXiv
As the general capabilities of large language models (LLMs) improve and agent applications become more widespread, the underlying deception risks urgently require systematic evaluation and effective oversight. Unlike existing evaluation which uses simulated games or presents limited choices, we introduce OpenDeception, a novel deception evaluation ...
arxiv  

A Deception Jamming Method Countering Bi- and Multistatic ISAR Based on Micro-Doppler Effect [PDF]

open access: gold, 2018
Zheng-Zhao Tang   +4 more
openalex   +1 more source

Defeating Super-Reactive Jammers With Deception Strategy: Modeling, Signal Detection, and Performance Analysis [PDF]

open access: green, 2022
Nguyễn Văn Huynh   +5 more
openalex   +1 more source

Home - About - Disclaimer - Privacy