Login / Signup
Honeypot Forensics, Part II: Analyzing the Compromised Host.
Frédéric Raynal
Yann Berthier
Philippe Biondi
Danielle Kaminsky
Published in:
IEEE Secur. Priv. (2004)
Keyphrases
</>
website
three dimensional
multi agent systems
digital libraries
digital watermark