Login / Signup

Baiting Inside Attackers Using Decoy Documents.

Brian M. BowenShlomo HershkopAngelos D. KeromytisSalvatore J. Stolfo
Published in: SecureComm (2009)
Keyphrases