Author:
Gangabissoon Tanveer,Nathoo Amaan,Ramhith Rakshay,Gopee Bhooneshwar,Bekaroo Girish
Publisher
Springer International Publishing
Reference21 articles.
1. Jhaveri, M., Cetin, O., Gañán, C., Moore, T., Eeten, M.: Abuse reporting and the fight against cybercrime. ACM Comput. Surv. (CSUR) 49(4), 68 (2017)
2. The Windows Club, “What are Honeypots and how can they secure computer systems” (2018).
http://www.thewindowsclub.com/what-are-honeypots
. Accessed 11 Apr 2014
3. Harrison, J.: Honeypots: The sweet spot in network security (2018).
https://www.computerworld.com/article/2573345/security0/honeypots–the-sweet-spot-in-network-security.html
. Accessed 28 Apr 2018
4. Yang, Y., Yang, H., Mi, J.: Design of distributed honeypot system based on intrusion tracking. In: 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN) (2011)
5. Zakari, A., Lawan, A., Bekaroo, G.: Towards improving the security of low-interaction honeypots: insights from a comparative analysis. In: International Conference on Emerging Trends in Electrical, Electronic and Communications Engineering (2016)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献