Honeypot: Concepts, Types and Working
暂无分享,去创建一个
[1] Rayford B. Vaughn,et al. Experiences with Honeypot Systems: Development, Deployment, and Analysis , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[2] Hassan Artail,et al. A dynamic honeypot design for intrusion detection , 2004, The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings..
[3] Ankit D. Patel,et al. Dynamic & hybrid honeypot model for scalable network monitoring , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).
[4] Zhiguang Qin,et al. Honeypot: a supplemented active defense system for network security , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[5] Baskoro Adi Pratomo,et al. Aggressive web application honeypot for exposing attacker's identity , 2014, 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering.
[6] Jian Bao,et al. Research on network security of defense based on Honeypot , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[7] Yun Yang,et al. Design and implementation of distributed intrusion detection system based on honeypot , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[8] Wei Huang,et al. A new type of intrusion prevention system , 2014, 2014 International Conference on Information Science, Electronics and Electrical Engineering.
[9] Iyatiti Mokube,et al. Honeypots: concepts, approaches, and challenges , 2007, ACM-SE 45.