Login / Signup

Study of Internet Threats and Attack Methods Using Honeypots and Honeynets.

Tomas SochorMatej Zuzcak
Published in: CN (2014)
Keyphrases
  • empirical studies
  • computational cost
  • benchmark datasets
  • countermeasures
  • email
  • cloud computing
  • machine learning methods