Outline
Some of the history of warfare
Some Models of Cyber Defense Processes
Roles for Deception
Deception Toolkit
DWALL and MAT
LEAN and related networks
Controlling Deceptions
Questions and comments
Previous slide
Next slide
Back to first slide
View graphic version