Using routers and honeypots in combination for collecting Internet worm attacks

The best way to first define honeypot would be to talk about its history, which we understand as an appropriate sequence of reading and understanding relevant critical information. There are many definitions of honeypot [1]. In other words, there is no clearly standardized definition of honeypot. Di...

Penerangan Penuh

Disimpan dalam:
Butiran Bibliografi
Pengarang-pengarang Utama: Mohammed, Mohssen M. Z. E., Pathan, Al-Sakib Khan
Format: Bab Buku
Bahasa:English
Diterbitkan: CRC Press, Taylor & Francis Group, USA 2014
Subjek-subjek:
Capaian Atas Talian:http://irep.iium.edu.my/34065/
http://irep.iium.edu.my/34065/
http://irep.iium.edu.my/34065/4/State-of-the-art-Intrusion-SakibPathan-Chapter3.pdf
Penanda-penanda: Tambah Penanda
Tiada Penanda, Jadilah orang pertama menanda rekod ini!