Honeypots: Basic Concepts, Classification and Educational Use as Resources in Information Security Education and Courses
暂无分享,去创建一个
[1] Carlos Francisco Lerma,et al. Creating Learning Objects , 2007 .
[2] C. Stoll. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .
[3] William Cheswick. An evening with Berferd , 1997 .
[4] David Collins. Using VMWare and live CD's to configure a secure, flexible, easy to manage computer lab environment , 2006 .
[5] Man Young Rhee,et al. Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .
[6] Thorsten Holz,et al. A Pointillist Approach for Comparing Honeypots , 2005, DIMVA.
[7] Marc Dacier,et al. Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots , 2006, RAID.
[8] Charles Border. The development and deployment of a multi-user, remote access virtualization system for networking, security, and system administration classes , 2007, SIGCSE '07.
[9] David Wiley,et al. Connecting learning objects to instructional design theory: A definition, a metaphor, and a taxonomy , 2000 .
[10] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[11] Christopher Kruegel,et al. Intrusion and Malware Detection and Vulnerability Assessment: Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings (Lecture Notes in Computer Science) , 2005 .
[12] Birger Tödtmann,et al. Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet , 2005, NETWORKING.
[13] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .