共 50 条
[41]
Automated signature generation algorithm for polymorphic worms based on improved TF-IDF
[J].
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition),
2020, 48 (02)
:79-84
[42]
Automatic Signature Generation for Polymorphic Worms by Combination ofToken Extraction and Sequence Alignment Approaches
[J].
2015 7TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT),
2015,
[44]
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
[J].
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA),
2017,
:829-834
[45]
Design of Network Security Experiment Teaching System Based on Honeypot Technology
[J].
2022 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 22),
2022,
:2132-2136
[46]
Implementation of a Modern Security Systems Honeypot Honey Network on Wireless Networks
[J].
2017 INTERNATIONAL YOUNG ENGINEERS FORUM (YEF-ECE),
2017,
:91-96
[47]
Attack Detection and Forensics Using Honeypot in IoT Environment
[J].
DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2019,
2019, 11319
:402-409
[50]
A Novel Deception Defense-Based Honeypot System for Power Grid Network
[J].
SMART COMPUTING AND COMMUNICATION,
2022, 13202
:297-307