| http://www.w3.org/ns/prov#value | - Setting up a machine in this manner permits the machine to monitor the activities of the entire network and scan for disallowed network activities without being easily detected by an intruder. [0033] The fifth method of deception used in this system is a moving target, provided by what is called a ???mobile machine??? deception unit.
|