![Using Deceptive Information in Computer Security Defenses: Security & Forensics Journal Article | IGI Global Using Deceptive Information in Computer Security Defenses: Security & Forensics Journal Article | IGI Global](https://coverimages.igi-global.com/cover-images/covers/ijcwt.png)
Using Deceptive Information in Computer Security Defenses: Security & Forensics Journal Article | IGI Global
![International Journal of Information and Computer Security (IJICS) Inderscience Publishers - linking academia, business and industry through research International Journal of Information and Computer Security (IJICS) Inderscience Publishers - linking academia, business and industry through research](https://www.inderscience.com/mobile/common/images/cover/scoverijics.jpg)
International Journal of Information and Computer Security (IJICS) Inderscience Publishers - linking academia, business and industry through research
![3 shows Top 15 affiliations as reported by authors who have published... | Download Scientific Diagram 3 shows Top 15 affiliations as reported by authors who have published... | Download Scientific Diagram](https://www.researchgate.net/publication/338965559/figure/fig3/AS:853689191395328@1580546772690/shows-Top-15-affiliations-as-reported-by-authors-who-have-published-documents-in-cyber.png)