Login / Signup

Honeycomb: creating intrusion detection signatures using honeypots.

Christian KreibichJon Crowcroft
Published in: Comput. Commun. Rev. (2004)
Keyphrases