Jump to Navigation

FOG

Link
Nathaniel Boggs
On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned
Decoy Document Deployment for Effective Masquerade Attack Detection
Baiting Inside Attackers Using Decoy Documents

Main menu

  • People
  • Publications
  • Projects
  • Tech Transfer
  • News
  • Sponsors