Baiting Inside Attackers Using Decoy Documents

IDS researcher: 
Book, Journal, or Conference name: 
Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks
Publisher or additional information: 
SecureComm
Pub date: 
2009