Login / Signup
Deception Techniques in Computer Security: A Research Perspective.
Xiao Han
Nizar Kheir
Davide Balzarotti
Published in:
ACM Comput. Surv. (2018)
Keyphrases
</>
computer security
computer systems
information security
network security
anomaly detection
intrusion detection
network intrusion detection
viewpoint
decision trees
computer forensics
databases
information systems
data warehouse
software engineering
intrusion detection system
incomplete information