Login / Signup

The DecoyPort: Redirecting Hackers to Honeypots.

Iksu KimMyungho Kim
Published in: NBiS (2007)
Keyphrases
  • forensic analysis
  • social networks
  • penetration testing
  • database
  • website
  • information technology
  • user interface
  • end users