Login / Signup
Evaluating Low Interaction Honeypots and On their Use against Advanced Persistent Threats.
Dimitris Fronimos
Emmanouil Magkos
Vassilios Chrissikopoulos
Published in:
Panhellenic Conference on Informatics (2014)
Keyphrases
</>
human computer interaction
information security
real time
real world
search engine
decision making
case study
high levels
malicious attacks