共 50 条
[23]
SCADA security using SSH honeypot
[J].
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19),
2019,
[24]
Efficient Hybrid Technique for Detecting Zero-Day Polymorphic Worms
[J].
SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC),
2014,
:95-100
[25]
Application of Virtual Honeypot on the Mining Enterprise Network Security
[J].
2012 WORLD AUTOMATION CONGRESS (WAC),
2012,
[26]
Dynamic & Hybrid Honeypot Model for Scalable Network Monitoring
[J].
2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES),
2014,
[27]
An experimental study on cloud honeypot and data visualization using ELK stack
[J].
INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS,
2021, 12
:1117-1132
[30]
Mitigating Threats in a Corporate Network with a Taintcheck-Enabled Honeypot
[J].
INFORMATION SCIENCE AND APPLICATIONS,
2020, 621
:73-83