Author:
Zakari Abubakar,Lawan Abdulmalik Ahmad,Bekaroo Girish
Publisher
Springer International Publishing
Reference31 articles.
1. Chakrabarti, A., Manimaran, G.: Internet infrastructure security: a taxonomy. IEEE Netw. 16(6), 13–21 (2002)
2. Tiwari, R., Jain, A.: Design and analysis of distributed honeypot system. Int. J. Comput. Appl. 55(13), 20–23 (2012)
3. Smith, M.: Huge rise in hack attacks as cyber-criminals target small businesses (2016).
https://www.theguardian.com/small-business-network/2016/feb/08/huge-rise-hack-attacks-cyber-criminals-target-small-businesses
. Accessed 20 Aug 2016
4. Yang, Y., Yang, H., Mi, J.: Design of distributed honeypot system based on intrusion tracking. In: IEEE 3rd International Conference on Communication Software and Networks (ICCSN), pp. 196–198. IEEE (2011)
5. Mukkamala, S., Yendrapalli, K., Basnet, R., Shankarapani, M.K., Sung, A.H.: Detection of virtual environments and low interaction honeypots. In: Information Assurance and Security Workshop, IAW 2007. IEEE SMC, pp. 92–98. IEEE (2007)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献