Login / Signup
Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet.
Frank Yeong-Sung Lin
Yu-Shun Wang
Ming-Yang Huang
Published in:
J. Appl. Math. (2013)
Keyphrases
</>
malicious attacks
computer vision
cloud computing
artificial intelligence
data mining
face recognition
high quality
search algorithm
intrusion detection
data center
network security