Abstract: Advanced cyber attackers can penetrate enterprise networks and steal critical documents containing intellectual property despite all access control measures. Cyber deception is one of many ...
Abstract: Insufficient authorization and overauthorization are two main problems to be solved in access control systems. If the authorization is too strict, users might not be able to access data that ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results