Return to Article Details A model of decoy system based on dynamic attributes for cybercrime investigation Download Download PDF