Author:
Vasilomanolakis Emmanouil,Karuppayah Shankar,Mühlhäuser Max,Fischer Mathias
Reference9 articles.
1. S. Antonatos, M. Locasto, and S. Sidiroglou. Defending Against Next Generation through Network / Endpoint Collaboration and Interaction. In 3rd European Conference on Computer Network Defense, pages 131--141. Springer US, 2009.
2. B. I. A. Barry and H. A. Chan. Intrusion Detection Systems. In Handbook of Information and Communication Security, pages 193--205. Springer Berlin, 2010.
3. C. Mulliner, S. Liebergeld, and M. Lange. Poster: HoneyDroid - Creating a Smartphone Honeypot. In IEEE Symposium on Security and Privacy (S&P), 2011.
4. B. Potter. Wireless hotspots: petri dish of wireless security. Communications of the ACM, 49(6):50--56, 2006.
5. L. Spitzner. Honeypots: Catching the Insider Threat. In Computer Security Applications Conference, pages 170--179. IEEE, 2003.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献