Login / Signup

Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet.

Frank Yeong-Sung LinYu-Shun WangMing-Yang Huang
Published in: J. Appl. Math. (2013)
Keyphrases
  • malicious attacks
  • computer vision
  • cloud computing
  • artificial intelligence
  • data mining
  • face recognition
  • high quality
  • search algorithm
  • intrusion detection
  • data center
  • network security