Defensive Computer-Security Deception Operations: Processes, Principles and Techniques

dc.contributor.advisorDr. Dorothy Denning, Committee Memberen_US
dc.contributor.advisorDr. Mladen Vouk, Committee Co-Chairen_US
dc.contributor.advisorDr. Donald Bitzer, Committee Memberen_US
dc.contributor.advisorDr. Ana I. Antón, Committee Co-Chairen_US
dc.contributor.authorYuill, James Josephen_US
dc.date.accessioned2010-04-02T19:17:07Z
dc.date.available2010-04-02T19:17:07Z
dc.date.issued2007-12-08en_US
dc.degree.disciplineComputer Scienceen_US
dc.degree.leveldissertationen_US
dc.degree.namePhDen_US
dc.description.abstracten_US
dc.identifier.otheretd-10272006-055733en_US
dc.identifier.urihttp://www.lib.ncsu.edu/resolver/1840.16/5648
dc.rightsI hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dis sertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to NC State University or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report.en_US
dc.subjectscanningen_US
dc.subjectintrusion detectionen_US
dc.subjectcomputer securityen_US
dc.subjecthoneypotsen_US
dc.subjectdeceptionen_US
dc.titleDefensive Computer-Security Deception Operations: Processes, Principles and Techniquesen_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
etd.pdf
Size:
1.08 MB
Format:
Adobe Portable Document Format

Collections