Techniques for assisting users in making security decisions
We are witnessing an arms race between attackers and security experts in todays Internet. Attackers hide their intentions and mimic legitimate behaviour to evade detection. Prominent attacks target end- users systems with a wide range of goals, such as monetary, financial, political, espionage, dest...
Published: |
|
---|---|
Online Access: | http://hdl.handle.net/2047/D20253675 |