Defensive Computer-Security Deception Operations: Processes, Principles and Techniques
No Thumbnail Available
Files
Date
2007-12-08
Authors
Journal Title
Series/Report No.
Journal ISSN
Volume Title
Publisher
Abstract
Description
Keywords
scanning, intrusion detection, computer security, honeypots, deception
Citation
Degree
PhD
Discipline
Computer Science
