Real-Time emulation of intrusion victim in honeyfarm
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Saved in:
Main Authors: | He, X.-Y., Lam, K.-Y., Chung, S.-L., Chi, H., Sun, J.-G. |
---|---|
Other Authors: | COMPUTER SCIENCE |
Format: | Article |
Published: |
2014
|
Subjects: | |
Online Access: | http://scholarbank.nus.edu.sg/handle/10635/113922 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | National University of Singapore |
Similar Items
-
Automatic scheme to construct Snort rules from honeypots data
by: Li, X., et al.
Published: (2013) -
Research and application of firewall log and intrusion detection log data visualization system
by: Ma, Mingze
Published: (2024) -
Calculation of the intrusion depth and its effects on microporous composite membranes
by: Chung, T.S.
Published: (2014) -
Application of content computing in honeyfarm
by: Huang, Y.-Y., et al.
Published: (2013) -
An Intrusion Response Decision-Making Model Based on Hierarchical Task Network Planning
by: MU, Chengpo, et al.
Published: (2010)