Login / Signup
The DecoyPort: Redirecting Hackers to Honeypots.
Iksu Kim
Myungho Kim
Published in:
NBiS (2007)
Keyphrases
</>
forensic analysis
social networks
penetration testing
database
website
information technology
user interface
end users