Login / Signup
Counteracting Information Threats Using Honeypot Systems Based on a Graph of Potential Attacks.
E. V. Zavadskii
D. V. Ivanov
Published in:
Autom. Control. Comput. Sci. (2022)
Keyphrases
</>
computer systems
countermeasures
end users
information sources
information sharing
malicious attacks
information extraction