Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?

Author(s):  
Hilmi Günes Kayacik ◽  
A. Nur Zincir-Heywood
Sign in / Sign up

Export Citation Format

Share Document