Exploiting Trust: Stealthy Attacks Through Socioware and...

  • Main
  • 2015
  • Exploiting Trust: Stealthy Attacks Through Socioware and...

Exploiting Trust: Stealthy Attacks Through Socioware and Insider Threats

Sood, Aditya K., Zeadally, Sherali, Bansal, Rohit
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Year:
2015
Language:
english
Journal:
IEEE Systems Journal
DOI:
10.1109/JSYST.2015.2388707
File:
PDF, 768 KB
english, 2015
Conversion to is in progress
Conversion to is failed