Inproceedings,

Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks.

, , , , , and .
HCI (16), volume 5638 of Lecture Notes in Computer Science, page 138-147. Springer, (2009)

Meta data

Tags

Users

  • @dblp

Comments and Reviews