Login / Signup

Should we share honeypot information for security management?

F. Wu
Published in: Integrated Network Management (2005)
Keyphrases
  • security management
  • database
  • wireless sensor networks
  • data processing