2021
DOI: 10.1109/tdsc.2019.2898661
|View full text |Cite
|
Sign up to set email alerts
|

A Fake Online Repository Generation Engine for Cyber Deception

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(31 citation statements)
references
References 18 publications
0
25
0
Order By: Relevance
“…Karjalaninen et al [36] suggested that, since members of medical institutions are always at risk of HIS accidents when on duty, training should be conducted such that these accidents can always be recognized. Today, not only medical institutions but also major corporations and government organizations are facing the reality that they may be hacked [37], so information security policies should be implemented for each institution to ensure information security. As for the results of our study, medical institutions can also strengthen their HIS behavior by providing empirical guidelines and ensuring that their institution workers remain familiar with them by checking relevant details within OCS, PACS, and EMR after work…”
Section: Discussionmentioning
confidence: 99%
“…Karjalaninen et al [36] suggested that, since members of medical institutions are always at risk of HIS accidents when on duty, training should be conducted such that these accidents can always be recognized. Today, not only medical institutions but also major corporations and government organizations are facing the reality that they may be hacked [37], so information security policies should be implemented for each institution to ensure information security. As for the results of our study, medical institutions can also strengthen their HIS behavior by providing empirical guidelines and ensuring that their institution workers remain familiar with them by checking relevant details within OCS, PACS, and EMR after work…”
Section: Discussionmentioning
confidence: 99%
“…The recorded shadow pixels are therefore ( 1 ′ , 2 ′ ) = (2,2). Although (3,5) and (0,3) are also matched with the secret digit, they are not back elements and thus conflict with the embedding rule.…”
Section: Related Workmentioning
confidence: 99%
“…With the growing public concerns over Internet privacy and security, there is an urgent appeal for research into secure communications in massive IoT. Pioneering works include the aggregate-signcryption [1], decentralized blockchain [2], FORGE system [3], and chaotic maps [4]. In this paper, we address this issue with a novel approach based on secret image sharing.…”
Section: Introductionmentioning
confidence: 99%
“…Chakraborty et al [165] designed a simple but novel method to delay attackers who want to steal important documents. The authors leveraged multi-layer graphs(MLGs) to represent target documents.…”
Section: Novel Defensementioning
confidence: 99%