Design and Analysis of Decoy Systems for Computer Security

This dissertation is aimed at defending against a range of internal threats, including eaves-dropping on network taps, placement of malware to capture sensitive information, and general insider threats to exfiltrate sensitive information. Although the threats and adversaries may vary, in each contex...

Full description

Bibliographic Details
Main Author: Bowen, Brian M.
Language:English
Published: 2011
Subjects:
Online Access:https://doi.org/10.7916/D8ZG707B