Social network attack simulation with honeytokens
Crossref DOI link: https://doi.org/10.1007/s13278-014-0221-5
Published Online: 2014-07-31
Published Print: 2014-12
Update policy: https://doi.org/10.1007/springer_crossmark_policy
White, Jonathan
Park, Joon S.
Kamhoua, Charles A.
Kwiat, Kevin A.
Text and Data Mining valid from 2014-07-31