
Decoy Document Deployment for Effective Masquerade Attack Detection
Book, Journal, or Conference name:
Proceedings of the Eighth Conference on Detection of Intrusions and Malware & Vulnerability Assessment
Pub date:
2011/07/07
PDF: