Login / Signup
On Recognizing Virtual Honeypots and Countermeasures.
Xinwen Fu
Wei Yu
Dan Cheng
Xuejun Tan
Kevin Streff
Steve Graham
Published in:
DASC (2006)
Keyphrases
</>
countermeasures
information security
virtual environment
power analysis
virtual reality
security measures
rural areas
virtual world
augmented reality
java card
database
data mining
smart card
cyber attacks
technological innovation
security breaches