Login / Signup

Using rootkits hiding techniques to conceal honeypot functionality.

Maryam MohammadzadJaber Karimpour
Published in: J. Netw. Comput. Appl. (2023)
Keyphrases
  • neural network
  • digital watermark
  • information retrieval
  • computer vision
  • image processing
  • website
  • digital libraries
  • probabilistic model