共 11 条
[2]
Enabling an Anatomic View to Investigate Honeypot Systems: A Survey
[J].
IEEE SYSTEMS JOURNAL,
2018, 12 (04)
:3906-3919
[3]
Fraunholz Daniel, 2017, 2017 International Conference on Cyber-Security and Protection of Digital Services (Cyber Security), DOI 10.1109/CyberSecPODS.2017.8074855
[4]
Data Mining in Long-Term Honeypot Data
[J].
2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017),
2017,
:649-656
[5]
Kuman S, 2017, 2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1262, DOI 10.23919/MIPRO.2017.7973617
[8]
Mushtakov RE, 2018, PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), P86, DOI 10.1109/EIConRus.2018.8317036
[10]
Sadasivam G.K., 2016, 2016 6 INT C IT CONV, P1, DOI 10.1109/ICITCS.2016.7740316