共 8 条
- [1] [Anonymous], 2015, Int. J. Netw. Secur.
- [2] Bhingarkar A., 2015, P INT C GRID COMP AP, P16
- [3] A proposal for a new way of classifying network security metrics. Study of the information collected through a honeypot [J]. 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 633 - 634
- [4] Kabiri Peyman., 2005, IJ Network Security, V1, P84
- [5] A data mining framework for building intrusion detection models [J]. PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, : 120 - 132
- [6] The honeynet project: Trapping the hackers [J]. Spitzner, L. (lance@honeynet.org), 1600, Institute of Electrical and Electronics Engineers Inc. (01): : 15 - 23
- [7] Stoll C., 1990, The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage