Author:
Veena M.,Upasana S.,Prathima S.,Senthilkumar Sudha
Reference20 articles.
1. Sun X, Wang Y, Ren J, Zhu Y, Liu S. Collecting Internet malware based on client-side honeypot. In: 9th IEEE International Conference for Young Computer Scientists (ICVCS 2008); 2008. pp. 1493-1498
2. Spitzner L. Honeypots: Tracking Hackers. Addison Wesley; 2002
3. Honeynet Project. Know Your Enemy: Defining Virtual Honey/nets. 2003. Available from: http://old.honeynet.org/papers/virtual/
4. Danford R. —2nd Generation Honeyclients. SANS Internet Storm Center; 2006. Available from: http://handlers.dshield.org/rdanford/pub/Honeyclients_Danford_SANS 06.pdf
5. Available from: http://www.honeyclient.org/trac
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献