Login / Signup

Honeypot Forensics, Part II: Analyzing the Compromised Host.

Frédéric RaynalYann BerthierPhilippe BiondiDanielle Kaminsky
Published in: IEEE Secur. Priv. (2004)
Keyphrases
  • website
  • three dimensional
  • multi agent systems
  • digital libraries
  • digital watermark