Author:
John John P.,Yu Fang,Xie Yinglian,Krishnamurthy Arvind,Abadi Martín
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages;Applied Cryptography and Network Security;2023
2. A deep learning assisted personalized deception system for countering web application attacks;Journal of Information Security and Applications;2022-06
3. Honeypot Framework, Limitation and Counter-Measure;Honeypot Frameworks and Their Applications: A New Framework;2018
4. Specialized Honeypot Applications;Honeypot Frameworks and Their Applications: A New Framework;2018
5. A First Look;Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense;2017-11-03