Baiting Inside Attackers Using Decoy Documents
IDS researcher: 
    
Book, Journal, or Conference name: 
    
                    Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks        
        Publisher or additional information: 
    
                    SecureComm        
        Pub date: 
    
                    2009        
        





