Return to Article Details An Octopus-Inspired Intrusion Deterrence Model in Distributed Computing System Download Download PDF