Network Based Detection of Virtual Environments and Low Interaction Honeypots
暂无分享,去创建一个
A.H. Sung | S. Mukkamala | P. Defibaugh-Chavez | R. Veeraghattam | M. Kannappa | A. Sung | S. Mukkamala | R. Veeraghattam | P. Defibaugh-Chavez | M. Kannappa
[1] Chi-Hang Chan,et al. Using Biased Support Vector Machine to Improve Retrieval Result in Image Retrieval with Self-organizing Map , 2004, ICONIP.
[2] James P. Egan,et al. Signal detection theory and ROC analysis , 1975 .
[3] P. Gács,et al. Algorithms , 1992 .
[4] Vladimir Cherkassky,et al. Model complexity control and statistical learning theory , 2002, Natural Computing.
[5] Andrew H. Sung,et al. Detection of Virtual Environments and Low Interaction Honeypots , 2007 .
[6] Jiao Licheng,et al. Automatic model selection for support vector machines using heuristic genetic algorithm , 2006 .
[7] T. Holz,et al. Detecting honeypots and other suspicious environments , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[8] T. Andrew Yang,et al. DESIGN OF NETWORK SECURITY PROJECTS USING HONEYPOTS * , 2005 .
[9] Kevin Curran,et al. Monitoring hacker activity with a Honeynet , 2005, Int. J. Netw. Manag..
[10] Olivier Chapelle,et al. Model Selection for Support Vector Machines , 1999, NIPS.
[11] Henry L. Owen,et al. The Use of Honeynets to Increase Computer Network Security and User Awareness , 2005 .