Login / Signup
A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots.
Nitin Naik
Paul Jenkins
Published in:
FUSION (2018)
Keyphrases
</>
ddos attacks
detecting malicious
forensic analysis
network intrusion detection systems
fuzzy sets
network intrusion
denial of service attacks
detect malicious
malicious activities
dos attacks
fuzzy logic
intrusion detection system
membership functions
identity theft
countermeasures
fuzzy neural network
human computer interaction
user interaction
fuzzy set theory
fuzzy numbers
malicious attacks
terrorist attacks
multi agent systems
web pages