Login / Signup

Active deception model for securing cloud infrastructure.

Albert BrzeczkoA. Selcuk UluagacRaheem A. BeyahJohn A. Copeland
Published in: INFOCOM Workshops (2014)
Keyphrases
  • mobile devices
  • conceptual framework