Login / Signup

Active authentication using file system decoys and user behavior modeling: results of a large scale study.

Jonathan VorisYingbo SongMalek Ben SalemShlomo HershkopSalvatore J. Stolfo
Published in: Comput. Secur. (2019)
Keyphrases