Login / Signup

Using Deceptive Information in Computer Security Defenses.

Mohammed H. AlmeshekahEugene H. Spafford
Published in: Int. J. Cyber Warf. Terror. (2014)
Keyphrases
  • computer security
  • computer vision
  • case study
  • data analysis
  • data processing
  • information sources