Author:
Li Keke,Li Haobo,Li Mohan,Sun Yanbin
Publisher
Springer Nature Singapore
Reference18 articles.
1. Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley Reading, Boston (2003)
2. Jiang, X., Wang, X.: “Out-of-the-Box” Monitoring of VM-based High-Interaction Honeypots. In Recent Advances in)Intrusion Detection (RAID 2007) (2007)
3. Liu, S., Wang, S., Sun, K.: Enhancing honeypot fidelity with real-time user behavior emulation. In: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S). IEEE (2023)
4. Ceron, João, M., et al.: MikroTik devices landscape, realistic honeypots, and automated attack classification. In: NOMS 2020–2020 IEEE/IFIP Network Operations and Management Symposium. IEEE (2020)
5. Sladić, M., et al.: LLM in the Shell: Generative Honeypots.” arXiv preprint arXiv:2309.00155 (2023)