共 15 条
[1]
Abbasi F.H., 2009, Telecommunication Networks and Applications Conference (ATNAC), 2009 Australasian, P1
[2]
Johnny A., 2009, IMPLEMENTATION HIGH
[3]
Li ZC, 2008, ADV INF SEC, V36, P25
[5]
Liu XW, 2011, COMM COM INF SC, V214, P93
[6]
Mansoori M, 2012, INT ARAB J INF TECHN, V9, P436
[7]
Memari N, 2014, IEEE REGION 10 SYMP, P496, DOI 10.1109/TENCONSpring.2014.6863084
[8]
Mokube Iyatiti, 2007, Proceedings of the 45th ACM Southeast Conference. ACMSE 07, P321, DOI 10.1145/1233341.1233399
[9]
Provos N., 2007, Virtual Honeypots: From Botnet Tracking to Intrusion Detection, V1st
[10]
Singh Abhay Nath, 2011, Proceedings 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011), P514, DOI 10.1109/ICSCCN.2011.6024606