Deception: Why It’s Not Just Another Honeypot
Reflections Upon Deception-Based Security Tactics
Copyright © 2019, Purdue University, all rights reserved. Purdue University is an equal access/equal opportunity university.
If you have trouble accessing this page because of a disability, please contact the CERIAS webmaster at firstname.lastname@example.org. Some content on this site may require the use of a special plug-in or application. Please visit our plug-ins page for links to download these applications.