Deception: Why It’s Not Just Another Honeypot
Reflections Upon Deception-Based Security Tactics
Copyright © 2018, Purdue University, all rights reserved. Purdue University is an equal access/equal opportunity university.
If you have trouble accessing this page because of a disability, please contact the CERIAS webmaster at email@example.com. Some content on this site may require the use of a special plug-in or application. Please visit our plug-ins page for links to download these applications.