Return to Article Details Generating Network Traps as Proactive Defense Against snoopers Download Download PDF