Abstract: In Internet of Things (IoT) environments, anti-honeypot attacks exploit device fingerprinting and protocol analysis to undermine traditional honeypot defenses. To this end, we introduce an ...
Abstract: Most of the existing camouflage effect evaluation methods are for static images, and the evaluation methods have problems of singularity and subjectivity. Therefore, this paper takes the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results