搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Jungsuk Song , Hiroki Takakura , Yongjin Kwon
DOI: 10.1109/SAINT.2008.85
关键词:
摘要: … honeypots and collected all traffic data to/from the honeypots. We also deployed another SNS7160 IDS system on the same networks as the honeypots… , we classified the testing data as …
9th International Conference on Knowledge Management in Organizations, KMO 2014,2014, 引用: 4
Neural Information Processing,2014, 引用: 6
International Journal of Computer Network and Information Security,2015, 引用: 2
,2011, 引用: 20
Security and Communication Networks,2014, 引用: 9
Proceedings of the 2015 International Conference on Intelligent Systems Research and Mechatronics Engineering,2015, 引用: 1
2012 Next Generation Networks and Services (NGNS),2012, 引用: 6
2013 IEEE 7th International Conference on Software Security and Reliability,2013, 引用: 18
ieee international advance computing conference,2014, 引用: 12
Journal of the Korea Institute of Information Security and Cryptology,2014, 引用: 2