![]() |
Volumn 2, Issue 5, 2004, Pages 77-80
|
Honeypot forensics, Part II: Analyzing the compromised host
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ARCHE/OMNETICA GROUP (CO);
BINARIES;
HSC (CO);
MISC (CO);
TEGAM INTERNATIONAL (CO);
CODES (SYMBOLS);
COMPUTER AIDED SOFTWARE ENGINEERING;
COMPUTER SIMULATION;
COMPUTER SOFTWARE;
DIGITAL LIBRARIES;
INFORMATION ANALYSIS;
PROJECT MANAGEMENT;
RECURSIVE FUNCTIONS;
REVERSE ENGINEERING;
SYSTEMS ANALYSIS;
WEBSITES;
COMPUTER NETWORKS;
|
EID: 12844259528
PISSN: 15407993
EISSN: None
Source Type: Journal
DOI: 10.1109/MSP.2004.70 Document Type: Review |
Times cited : (18)
|
References (2)
|