Author:
Djap Ryandy,Lim Charles,Silaen Kalpin Erlangga,Yusuf Andi
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automated Attacker Behaviour Classification Using Threat Intelligence Insights;Lecture Notes in Computer Science;2024
2. An Improved Honeypot Model for Attack Detection and Analysis;Proceedings of the 18th International Conference on Availability, Reliability and Security;2023-08-29
3. Analyzing Adversary’s Attack on Ethereum Collected from Honeypots;2023 11th International Conference on Information and Communication Technology (ICoICT);2023-08-23
4. Semantic Similarities for Honeypot Collected Linux Shell Commands;2023 11th International Conference on Information and Communication Technology (ICoICT);2023-08-23
5. Unveiling Attack Patterns: A Study of Adversary Behavior from Honeypot Data;2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs);2023-08-22