Decoy Document Deployment for Effective Masquerade Attack Detection

IDS researcher: 
Book, Journal, or Conference name: 
Proceedings of the Eighth Conference on Detection of Intrusions and Malware & Vulnerability Assessment
Pub date: 
2011/07/07