Login / Signup
Study of Internet Threats and Attack Methods Using Honeypots and Honeynets.
Tomas Sochor
Matej Zuzcak
Published in:
CN (2014)
Keyphrases
</>
empirical studies
computational cost
benchmark datasets
countermeasures
email
cloud computing
machine learning methods