MILCOM 2015 - 2015 IEEE Military Communications Conference 2015
DOI: 10.1109/milcom.2015.7357561
|View full text |Cite
|
Sign up to set email alerts
|

On detection and concealment of critical roles in tactical wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 16 publications
0
1
0
Order By: Relevance
“…To disrupt the adversaries' cyber kill chain, both schemes can be used at the same time or at different stages. For example, recent works on network anti-inference [49], [50] suggest combining both MTD technique (i.e., dynamic change of network routing) and deception technique (i.e., adding fake network traffic) to effectively disrupt adversaries' capability to identify network flows and to determine critical nodes of the network. In addition, both techniques can be applied at different stages: while both MTD deception can mislead adversaries' reconnaissance efforts, MTD can further increase the complexity and difficulty for them to penetrate a system.…”
Section: E Combining Deception and Mtd Approachesmentioning
confidence: 99%
“…To disrupt the adversaries' cyber kill chain, both schemes can be used at the same time or at different stages. For example, recent works on network anti-inference [49], [50] suggest combining both MTD technique (i.e., dynamic change of network routing) and deception technique (i.e., adding fake network traffic) to effectively disrupt adversaries' capability to identify network flows and to determine critical nodes of the network. In addition, both techniques can be applied at different stages: while both MTD deception can mislead adversaries' reconnaissance efforts, MTD can further increase the complexity and difficulty for them to penetrate a system.…”
Section: E Combining Deception and Mtd Approachesmentioning
confidence: 99%
“…Some hotel website or home page for a long time can not update the information , but a lack of hotel communication and interaction with customers , in fact, has become a figurehead for the empty station . [3] From objective reality , the majority of e-Business service provider fore-businesssoftware and hardware solutions provided by hotel companies can only belong to e-business technology solutions , computer hardware and software systems which simply reflected an overall e-business technology platform concept , service providers difficult enterprise business operations from a specific property characteristics and needs of departure for the complete design and planning. The resulting hotel business e-business applications , can not make the technology platform and business processes to form a perfect combination.…”
Section: China 'S Hotel Industry To Implement E-business Management M...mentioning
confidence: 99%