Login / Signup
Honeypot utilization for analyzing cyber attacks.
Otto Hrad
Simo Kemppainen
Published in:
ECSA Workshops (2016)
Keyphrases
</>
cyber attacks
cyber security
cyber defense
countermeasures
critical infrastructure
intrusion detection system
security policies
privacy issues
dos attacks
intrusion detection
social networks
mobile agents