Spy vs. Spy: counter-intelligence methods for backtracking malicious intrusions

Sorry, there's nothing here.

Cite this paper

@inproceedings{Alexander2011SpyVS, title={Spy vs. Spy: counter-intelligence methods for backtracking malicious intrusions}, author={Jason S. Alexander and Thomas R. Dean and Scott Knight}, booktitle={CASCON}, year={2011} }