Login / Signup
Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots.
Corrado Leita
Marc Dacier
Frédéric Massicotte
Published in:
RAID (2006)
Keyphrases
</>
cryptographic protocols
secure routing
security protocols
denial of service attacks
lightweight
network intrusion
semi automatic
watermarking scheme
forensic analysis
detecting malicious
security analysis
application layer
end hosts