Login / Signup

Three decades of deception techniques in active cyber defense - Retrospect and outlook.

Li ZhangVrizlynn L. L. Thing
Published in: Comput. Secur. (2021)
Keyphrases
  • cyber defense
  • information security
  • cyber attacks
  • cyber security
  • databases
  • critical infrastructure
  • social networks