Publisher
Springer International Publishing
Reference55 articles.
1. F. Abbasi and R. Harris, Experiences with a Generation III virtual honeynet, Proceedings of the Australasian Telecommunications Networks and Applications Conference, 2009
2. R. Bejtlich, The Tao of Network Security Monitoring: Beyond Intrusion Detection, Addison-Wesley, Boston, Massachusetts, 2004
3. J. Briffaut, J. Lalande and C. Toinard, Security and results of a large-scale high-interaction honeypot, Journal of Computers, vol. 4(5), pp. 395–404, 2009
4. C. Bronk and E. Tikk-Ringas, The cyber attack on Saudi Aramco, Survival, vol. 55(2), pp. 81–96, 2013
5. D. Buza, F. Juhasz, G. Miru, M. Felegyhazi and T. Holczer, CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot, Proceedings of the Second International Workshop on Smart Grid Security, pp. 181–192, 2014
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献