Inproceedings,

Looking from the hacker's perspective: Role of deceptive strategies in cyber security.

, , and .
CyberSA, page 1-6. IEEE, (2016)

Meta data

Tags

Users

  • @dblp

Comments and Reviews