Deception Group

Options Search

Papers and Presentations

Discussing the Use of Deception

Systemization, Modeling and Integrating of Deception

Using Deception in Authentication

Deceptive Patching

  • Jeff Avery. The Application of Deception to Software Security Patching Purdue University Computer Science, Ph.D. Dissertation and CERIAS TR 2017-03, August 2017. [PhD disseration]
  • Avery, J., & Spafford, E. H. (2017, May). Ghost Patches: Fake Patches for Fake Vulnerabilities. In IFIP International Conference on ICT Systems Security and Privacy Protection (pp. 399-412). Springer, Cham. [Poster] . [Paper].

Deceptive Memory

Dissertations and Theses


 ·   Deception Home
 ·   Categories
 ·   Title List
 ·   Recent Changes
 ·   RSS
 ·   Atom

Create or Find Page: