Defensive Deception in Enterprise Networks: Adaptive Honeyfiles, Decoy Network Flows, and Honeypots
| dc.contributor.advisor | Munindar Singh, Chair | |
| dc.contributor.advisor | William Enck, Member | |
| dc.contributor.advisor | Khaled Abdel Harfoush, Member | |
| dc.contributor.advisor | Rudra Dutta, Member | |
| dc.contributor.advisor | Jin-Hee Cho, External | |
| dc.contributor.author | Zhu, Mu | |
| dc.date.accepted | 2024-04-17 | |
| dc.date.accessioned | 2024-04-18T12:30:27Z | |
| dc.date.available | 2024-04-18T12:30:27Z | |
| dc.date.defense | 2023-11-16 | |
| dc.date.issued | 2023-11-16 | |
| dc.date.released | 2024-04-18 | |
| dc.date.reviewed | 2023-12-19 | |
| dc.date.submitted | 2023-12-04 | |
| dc.degree.discipline | Computer Science | |
| dc.degree.level | dissertation | |
| dc.degree.name | Doctor of Philosophy | |
| dc.identifier.other | deg35881 | |
| dc.identifier.uri | https://www.lib.ncsu.edu/resolver/1840.20/41787 | |
| dc.title | Defensive Deception in Enterprise Networks: Adaptive Honeyfiles, Decoy Network Flows, and Honeypots |
Files
Original bundle
1 - 1 of 1
