×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [use shadow]
Home >
use shadow
Transparency 7 Click the mouse button or press the Space Bar to display the answers.
216 views
DETECTING TARGETED ATTACKS USING SHADOW HONEYPOTS AUTHORS: K. G. Anagnostakisy, S. Sidiroglouz, P. Akritidis, K. Xinidis, E. Markatos, A. D. Keromytisz.
215 views