Detecting Masquerading Attack in Software and in Hardware | Publicación