Login / Signup
A new approach to enforce the security properties of a clustered high-interaction honeypot.
Jérémy Briffaut
Jonathan Rouzaud-Cornabas
Christian Toinard
Yacine Zemali
Published in:
HPCS (2009)
Keyphrases
</>
security properties
security requirements
security analysis
formal model
security vulnerabilities
real time
artificial intelligence
case study
response time
distributed systems
wireless networks
formal methods
cryptographic protocols