Login / Signup

Classifying malicious activities in Honeynets using entropy and volume-based thresholds.

Mohammed H. SqalliSyed Naeem FirdousKhaled SalahMarwan H. Abu-Amara
Published in: Secur. Commun. Networks (2013)
Keyphrases