Author:
Heckman Kristin E.,Walsh Michael J.,Stech Frank J.,O'Boyle Todd A.,DiCato Stephen R.,Herber Audra F.
Subject
Law,General Computer Science
Reference16 articles.
1. Cheating and deception;Bell,1982
2. Counterdeception principles and applications for national security;Bennett,2007
3. When admins attack: 30 hours in the life of a Gumblar victim;Brandt;Netw Security,2010
4. Detecting traffic snooping in Tor using decoys;Chakravarty;Lecture Notes Comput Sci,2011
5. The craft of intelligence;Dulles,1963
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献