![Computer network security / Decoy / Cryptography / Salvatore J. Stolfo / Honeypot / Computer security Computer network security / Decoy / Cryptography / Salvatore J. Stolfo / Honeypot / Computer security](https://www.pdfsearch.io/img/3babdd0ac20ada83127ff559d3edd023.jpg) Date: 2012-12-05 15:53:47Computer network security Decoy Cryptography Salvatore J. Stolfo Honeypot Computer security | | Bait and Snitch: Defending Computer Systems with Decoys Jonathan Voris, Jill Jermyn, Angelos D. Keromytis, and Salvatore J. Stolfo Department of Computer Science Columbia University, New York, NY 10027 {jvoris@cs., jj260Add to Reading ListSource URL: ids.cs.columbia.eduDownload Document from Source Website File Size: 190,31 KBShare Document on Facebook
|