Author:
Yang Yun,Yang Hongli,Mi Jia
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Research on Network Intrusion Detection Technology Based on Honeypot;2024 5th International Conference on Information Science, Parallel and Distributed Systems (ISPDS);2024-05-31
2. Review of Innovative Cyberspace Security Research Inspired by Bionics Computing Methods;2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI);2019-08
3. Improving Effectiveness of Honeypots: Predicting Targeted Destination Port Numbers During Attacks Using J48 Algorithm;Smart and Sustainable Engineering for Next Generation Applications;2019
4. Bir Güvenlik Trendi: Bal Küpü;Acta INFOLOGICA;2018-06-26
5. Towards Improving the Security of Low-Interaction Honeypots: Insights from a Comparative Analysis;Emerging Trends in Electrical, Electronic and Communications Engineering;2017