Author:
Djanali Supeno,Arunanto F.X.,Pratomo Baskoro Adi,Baihaqi Abdurrazak,Studiawan Hudan,Shiddiqi Ary Mazharuddin
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Evaluation of Reinforcement Learning Algorithm on SSH Honeypot;2022 6th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE);2022-12-13
2. Development of a Compressive Framework Using Machine Learning Approaches for SQL Injection Attacks;PRZEGLĄD ELEKTROTECHNICZNY;2022-07-01
3. A deep learning assisted personalized deception system for countering web application attacks;Journal of Information Security and Applications;2022-06
4. A Novel Method of Honeypot Inclusive WAF to Protect from SQL Injection and XSS;2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON);2021-11-19
5. Scraping Airlines Bots: Insights Obtained Studying Honeypot Data;International Journal of Cyber Forensics and Advanced Threat Investigations;2021-05-22