Login / Signup
Using Deceptive Information in Computer Security Defenses.
Mohammed H. Almeshekah
Eugene H. Spafford
Published in:
Int. J. Cyber Warf. Terror. (2014)
Keyphrases
</>
computer security
computer vision
case study
data analysis
data processing
information sources