Login / Signup
Thoughts on the Application of Low-Interactive Honeypot Based on Raspberry Pi in Public Security Actual Combat, LIHRP.
Jing Shi
Mingyang Chen
Jiazheng Jiao
Published in:
ICAIS (3) (2022)
Keyphrases
</>
intrusion detection
decision making
access control
security policies
forensic analysis
network connection
data sets
genetic algorithm
fuzzy logic
security issues