Publisher
Springer Science and Business Media LLC
Reference45 articles.
1. Jung H, et al. (2018) Less-forgetful learning for domain expansion in deep neural networks Thirty-Second AAAI Conference on Artificial Intelligence
2. Brown S, Lam R, Prasad S, Ramasubramanian S, Slauson J (2012) Honeypots in the cloud. University of Wisconsin-Madison, p 11
3. Saadi C, Chaoui H (2016) Cloud computing security using ids-am-clust, honeyd, honeywall and honeycomb, vol 85
4. Kondra JR, Bharti SK, Mishra SK, Babu KS (2016) Honeypot-based intrusion detection system: a performance analysis. In: 2016 3rd international conference on computing for sustainable global development (INDIACom), pp. 2347–2351. IEEE
5. Ghourabi A, Abbes T, Bouhoula A (2014) Characterization of attacks collected from the deployment of Web service honeypot. Secur. Commun. Netw. 7(2):338–351
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献