
Baiting Inside Attackers Using Decoy Documents
IDS researcher:
Book, Journal, or Conference name:
Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks
Publisher or additional information:
SecureComm
Pub date:
2009