Adaptive and Flexible Virtual Honeynet
暂无分享,去创建一个
[1] Aitor Corchero,et al. Distributed virtual scenarios over multi-host Linux environments , 2011, 2011 5th International DMTF Academic Alliance Workshop on Systems and Virtualization Management: Standards and the Cloud (SVM).
[2] Alen Capalik. Next-Generation Honeynet Technology with Real-Time Forensics for U.S. Defense , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[3] Claudia Eckert,et al. Nitro: Hardware-Based System Call Tracing for Virtual Machines , 2011, IWSEC.
[4] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[5] C. Stoll. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .
[6] Riccardo Bettati,et al. Camouflaging Virtual Honeypots , 2005 .
[7] Fahim H. Abbasi,et al. Experiences with a Generation III virtual Honeynet , 2009, 2009 Australasian Telecommunication Networks and Applications Conference (ATNAC).
[8] Lok Kwong Yan,et al. Virtual honeynets revisited , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[9] Haifeng Wang,et al. Dynamic Deploying Distributed Low-interaction Honeynet , 2012, J. Comput..
[10] Xuxian Jiang,et al. "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots , 2007, RAID.
[11] Nogal Memari,et al. Towards virtual honeynet based on LXC virtualization , 2014, 2014 IEEE REGION 10 SYMPOSIUM.
[12] M. Curty. Quantum cryptography: Know your enemy , 2014 .
[13] Brian Hay,et al. Automated Honeynet Deployment for Dynamic Network Environment , 2013, 2013 46th Hawaii International Conference on System Sciences.