Deception
Deception | ||||
---|---|---|---|---|
Date | Document Title | Author | Modified | Comments |
2009–08–24 | Computing Under Occupation | K. Kursawe and S. Katzenbeisser | Steven Borbash | Directly relates to a theme of this workshop |
2009–07–13 | Baiting Inside Attackers Using Decoy | Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo | Salvatore J. Stolfo | In this work we propose trap-based defense mechanisms and a deployment platform for addressing the problem of insiders attempting to exltrate... |