Design and Analysis of Decoy Systems for Computer Security
This dissertation is aimed at defending against a range of internal threats, including eaves-dropping on network taps, placement of malware to capture sensitive information, and general insider threats to exfiltrate sensitive information. Although the threats and adversaries may vary, in each contex...
Main Author: | |
---|---|
Language: | English |
Published: |
2011
|
Subjects: | |
Online Access: | https://doi.org/10.7916/D8ZG707B |