SECURING WMN USING HONEYPOT TECHNIQUE
暂无分享,去创建一个
[1] Kyi Lin Lin Kyaw. Hybrid Honeypot System for Network Security , 2008 .
[2] Tarun Kumar,et al. Threats and Vulnerabilities in Wireless Mesh Networks , 2009 .
[3] Chengyu Song,et al. Collecting Autonomous Spreading Malware Using High-Interaction Honeypots , 2007, ICICS.
[4] Zygmunt J. Haas,et al. An integrated security framework for open wireless networking architecture , 2007, IEEE Wireless Communications.
[5] Reinhard German,et al. Flow-based Worm Detection using Correlated Honeypot Logs , 2011 .
[6] Iyatiti Mokube,et al. Honeypots: concepts, approaches, and challenges , 2007, ACM-SE 45.
[7] Zhiguang Qin,et al. Honeypot: a supplemented active defense system for network security , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[8] Yogendra Kumar Jain,et al. Honeypot based Secure Network System , 2011 .