Abstract is missing.
- Integrating Cyber-D&D into Adversary Modeling for Active Cyber DefenseFrank J. Stech, Kristin E. Heckman, Blake E. Strom. 1-24 [doi]
- Cyber Security DeceptionMohammed H. Almeshekah, Eugene H. Spafford. 25-52 [doi]
- Quantifying Covertness in Deceptive Cyber OperationsGeorge Cybenko, Gabriel Stocco, Patrick Sweeney. 53-69 [doi]
- Design Considerations for Building Cyber Deception SystemsGreg Briskin, Dan Fayette, Nick Evancich, Vahid Rajabian-Schwart, Anthony Macera, Jason Li. 71-97 [doi]
- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless NetworksZhuo Lu, Cliff Wang, Mingkui Wei. 99-116 [doi]
- Effective Cyber DeceptionA. J. Underbrink. 117-149 [doi]
- Cyber-Deception and Attribution in Capture-the-Flag ExercisesEric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little. 151-167 [doi]
- Deceiving Attackers by Creating a Virtual Attack SurfaceMassimiliano Albanese, Ermanno Battista, Sushil Jajodia. 169-201 [doi]
- Embedded HoneypottingFrederico Araujo, Kevin W. Hamlen. 203-233 [doi]
- Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS AttacksEhab Al-Shaer, Syed Fida Gillani. 235-259 [doi]
- Exploring Malicious Hacker ForumsJana Shakarian, Andrew T. Gunn, Paulo Shakarian. 261-284 [doi]
- Anonymity in an Electronic Society: A SurveyMauro Conti, Fabio De Gaspari, Luigi Vincenzo Mancini. 285-314 [doi]