Login / Signup
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks.
John G. Levine
Richard LaBella
Henry L. Owen
Didier Contis
Brian Culver
Published in:
IAW (2003)
Keyphrases
</>
distributed systems
information retrieval
image processing
expert systems
systems require
machine learning
decision trees
similarity measure
data model
management system
computational intelligence
learning systems
automatic detection