Defensive Deception in Enterprise Networks: Adaptive Honeyfiles, Decoy Network Flows, and Honeypots

dc.contributor.advisorMunindar Singh, Chair
dc.contributor.advisorWilliam Enck, Member
dc.contributor.advisorKhaled Abdel Harfoush, Member
dc.contributor.advisorRudra Dutta, Member
dc.contributor.advisorJin-Hee Cho, External
dc.contributor.authorZhu, Mu
dc.date.accepted2024-04-17
dc.date.accessioned2024-04-18T12:30:27Z
dc.date.available2024-04-18T12:30:27Z
dc.date.defense2023-11-16
dc.date.issued2023-11-16
dc.date.released2024-04-18
dc.date.reviewed2023-12-19
dc.date.submitted2023-12-04
dc.degree.disciplineComputer Science
dc.degree.leveldissertation
dc.degree.nameDoctor of Philosophy
dc.identifier.otherdeg35881
dc.identifier.urihttps://www.lib.ncsu.edu/resolver/1840.20/41787
dc.titleDefensive Deception in Enterprise Networks: Adaptive Honeyfiles, Decoy Network Flows, and Honeypots

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
etd.pdf
Size:
1.66 MB
Format:
Adobe Portable Document Format

Collections