Login / Signup
Classifying malicious activities in Honeynets using entropy and volume-based thresholds.
Mohammed H. Sqalli
Syed Naeem Firdous
Khaled Salah
Marwan H. Abu-Amara
Published in:
Secur. Commun. Networks (2013)
Keyphrases
</>
malicious activities
identity theft
intrusion detection system
online social networks
false positive rate
security issues
intrusion detection
social networks
information systems
computational cost
data processing