Fox in the trap: thwarting masqueraders via automated decoy document deployment
暂无分享,去创建一个
Salvatore J. Stolfo | Nathaniel Boggs | Jonathan Voris | Jill Jermyn | S. Stolfo | Jonathan Voris | Nathaniel Boggs | Jill Jermyn
[1] Ronald L. Rivest,et al. Honeywords: making password-cracking detectable , 2013, CCS.
[2] Salvatore J. Stolfo,et al. Baiting Inside Attackers Using Decoy Documents , 2009, SecureComm.
[3] Decoy Document Deployment for Effective Masquerade Attack Detection , 2011, DIMVA.
[4] C. Causer. The Art of War , 2011, IEEE Potentials.
[5] J. Yuill,et al. Honeyfiles: deceptive files for intrusion detection , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[6] Clifford Stoll,et al. The Cuckoo's Egg , 1989 .
[7] Stefan Katzenbeisser,et al. From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation , 2014, CCS.