Network monitoring & analysis along with comparative study of honeypots
暂无分享,去创建一个
[1] Shujun Li,et al. A novel anti-phishing framework based on honeypots , 2009, 2009 eCrime Researchers Summit.
[2] Yuichi Nakamura,et al. Efficient key management based on the subset difference method for secure group communication , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[3] David Fernández,et al. Versatile virtual honeynet management framework , 2017, IET Inf. Secur..
[4] Jung Hee Cheon,et al. White-box AES implementation revisited , 2016, Journal of Communications and Networks.
[5] Martin Husák,et al. PhiGARo: Automatic Phishing Detection and Incident Response Framework , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.
[6] Debasish Jena,et al. Honeypot in network security: a survey , 2011, ICCCS '11.
[7] Anazida Zainal,et al. Fraud detection system: A survey , 2016, J. Netw. Comput. Appl..
[8] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..
[9] Ejaz Ahmed,et al. Securing software defined networks: taxonomy, requirements, and open issues , 2015, IEEE Communications Magazine.
[10] Dharma P. Agrawal,et al. APCAPT: Asymmetric power control against packet tracer attacks for base station location anonymity , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).
[11] Angelo Furfaro,et al. Honeypot-Powered Malware Reverse Engineering , 2016, 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW).