Login / Signup

Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks.

Barbara Endicott-PopovskyJulia NarvaezChristian SeifertDeborah A. FrinckeLori Ross O'NeilChiraag Uday Aval
Published in: HCI (16) (2009)
Keyphrases