Login / Signup

Decoy Document Deployment for Effective Masquerade Attack Detection.

Malek Ben SalemSalvatore J. Stolfo
Published in: DIMVA (2011)
Keyphrases
  • attack detection
  • information retrieval
  • multistage
  • information systems