Decoy Document Deployment for Effective Masquerade Attack Detection
Book, Journal, or Conference name: 
    
                    Proceedings of the Eighth Conference on Detection of Intrusions and Malware & Vulnerability Assessment        
        Pub date: 
    
                    2011/07/07        
        PDF: 
    






