Login / Signup
Three decades of deception techniques in active cyber defense - Retrospect and outlook.
Li Zhang
Vrizlynn L. L. Thing
Published in:
Comput. Secur. (2021)
Keyphrases
</>
cyber defense
information security
cyber attacks
cyber security
databases
critical infrastructure
social networks