Research on fog computing based active anti-theft technology
暂无分享,去创建一个
[1] Decoy Document Deployment for Effective Masquerade Attack Detection , 2011, DIMVA.
[2] Malek Ben Salem,et al. Combining a Baiting and a User Search Profiling Techniques for Masquerade Detection , 2011 .
[3] Malek Ben Salem,et al. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[4] Salvatore J. Stolfo,et al. Lost in Translation: Improving Decoy Documents via Automated Translation , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[5] N. Rowe. Deception in defense of computer systems from cyber-attack , 2007 .
[6] Salvatore J. Stolfo,et al. Baiting Inside Attackers Using Decoy Documents , 2009, SecureComm.