Return to Article Details
A model of decoy system based on dynamic attributes for cybercrime investigation
Download
Download PDF