Inproceedings,

Decoy Document Deployment for Effective Masquerade Attack Detection.

, and .
DIMVA, volume 6739 of Lecture Notes in Computer Science, page 35-54. Springer, (2011)

Meta data

Tags

Users

  • @dblp

Comments and Reviews