|
Volumn 2005, Issue , 2005, Pages 29-36
|
Detecting honeypots and other suspicious environments
c
MISC Magazine
(France)
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTATIONAL METHODS;
COMPUTER CRIME;
COMPUTER NETWORKS;
COMPUTER SIMULATION;
CYBERNETICS;
INFORMATION TECHNOLOGY;
PATTERN RECOGNITION;
PROGRAM DEBUGGING;
SECURITY SYSTEMS;
ELECTRONIC DECOYS;
HONEYPOTS;
MALICIOUS ATTACKERS;
SECURITY TOOLS;
ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS;
|
EID: 33745434223
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/IAW.2005.1495930 Document Type: Conference Paper |
Times cited : (140)
|
References (24)
|