Login / Signup

Counteracting Information Threats Using Honeypot Systems Based on a Graph of Potential Attacks.

E. V. ZavadskiiD. V. Ivanov
Published in: Autom. Control. Comput. Sci. (2022)
Keyphrases
  • computer systems
  • countermeasures
  • end users
  • information sources
  • information sharing
  • malicious attacks
  • information extraction