Author:
Sri Latha P.,Prasanth Vaidya S.
Reference18 articles.
1. Adithyan, A., Sivabalan, K., Hariharan, A., Haritha, N., Camillus, P., Kumar, P.D.: Lsaf: A novel comprehensive application and network security framework for linux. In: 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), vol. 1., pp. 1289–1292. IEEE (2021)
2. Gjermundrød, H., Dionysiou, I.: Cloudhoneycy-an integrated honeypot framework for cloud infrastructures. In: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), pp. 630–635. IEEE (2015)
3. Tsikerdekis, M., Zeadally, S., Schlesener, A., Sklavos, N.: Approaches for preventing honeypot detection and compromise. In: Global Information Infrastructure and Networking Symposium (GIIS), vol. 2018, pp. 1–6 . IEEE (2018)
4. Kuwatly, I., Sraj, M., Al Masri, Z., Artail, H.: A dynamic honeypot design for intrusion detection. In: The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings, pp. 95–104. IEEE (2004)
5. Chen, J.I.Z., Yeh, L.T.: Analysis of the impact of mechanical deformation on strawberries harvested from the farm. J. ISMAC (3) 166–172 (2020)