Login / Signup

Cyber threat analysis for university networks via virtual honeypots.

Will Davis IIIHongmei Chi
Published in: ACM Southeast Regional Conference (2011)
Keyphrases
  • statistical analysis
  • data sets
  • quantitative analysis
  • database
  • data analysis
  • image analysis
  • virtual environment
  • static analysis
  • real time
  • network analysis