A survey of honeypot research: Trends and opportunities
暂无分享,去创建一个
[1] Shiva Azadegan,et al. Use of honeynets in computer security education , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).
[2] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[3] James Wong. COMPUTER SCIENCE DEPARTMENT , 1971 .
[4] Anjali Sardana,et al. Honeypots: A New Paradigm to Information Security , 2011 .
[5] William Yurcik,et al. Internet honeypots: protection or entrapment? , 2002, IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293).
[6] Iyatiti Mokube,et al. Honeypots: concepts, approaches, and challenges , 2007, ACM-SE 45.
[7] Jérémy Briffaut,et al. Security and Results of a Large-Scale High-Interaction Honeypot , 2009, J. Comput..
[8] Hiroshi Fujinoki,et al. A Survey: Recent Advances and Future Trends in Honeypot Research , 2012 .
[9] A. Kaplan,et al. Users of the world, unite! The challenges and opportunities of Social Media , 2010 .
[10] villpasc. Computer Science Department , 2016 .
[11] Thomas C. O'Guinn,et al. brand community , 2022, The Fairchild Books Dictionary of Fashion.
[12] W. Martin. Honey pots and honey nets , Security through deception , 2001 .
[13] Cristine Hoepers,et al. Honeynets Applied to the CSIRT Scenario , 2003 .
[14] K. Anagnostakis,et al. Shadow Honeypots , 2009 .
[15] R. Kozinets. The Field behind the Screen: Using Netnography for Marketing Research in Online Communities , 2002 .
[16] Vivek Sharma. Use of Honeypots to Increase Awareness regarding Network Security , 2012 .
[17] Xuxian Jiang,et al. Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention , 2006, J. Parallel Distributed Comput..