Shimanaka Tohru, profile picture

Shimanaka Tohru

Sort by
Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN Approach
Cyber Deception After Detection: Safe Observation Environment Using Software Defined Networking