Cited By
View all- Reti DBecker NAngeli TChattopadhyay ASchneider DVollmer SSchotten HGong NLi Q(2024)Act as a Honeytoken Generator! An Investigation into Honeytoken Generation with Large Language ModelsProceedings of the 11th ACM Workshop on Adaptive and Autonomous Cyber Defense10.1145/3689935.3690394(1-12)Online publication date: 11-Nov-2024
- Kahlhofer MAchleitner SRass SMayrhofer R(2024)Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based QuestionnairesProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678897(317-336)Online publication date: 30-Sep-2024
- Cui JLiu XZhong HZhang JWei LBolodurina IHe D(2024)A Practical and Provably Secure Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency RescueIEEE Transactions on Network Science and Engineering10.1109/TNSE.2023.332397211:2(1454-1468)Online publication date: Mar-2024
- Show More Cited By