메뉴 건너뛰기




Volumn , Issue , 2013, Pages 36-41

Behavioural observation for critical infrastructure security support

Author keywords

Behavioural Observation; Critical Infrastructure; Cyber Attack; Data Classification; Simulation

Indexed keywords

CRITICAL INFRASTRUCTURES; PUBLIC WORKS;

EID: 84899531799     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EMS.2013.6     Document Type: Conference Paper
Times cited : (8)

References (9)
  • 6
    • 33645791274 scopus 로고    scopus 로고
    • Honeycomb: Creating intrusion detection signatures using honeypots
    • doi: 10.1145/972374.972384
    • C. Kreibich and J. Crowcroft, "Honeycomb: creating intrusion detection signatures using honeypots", ACM SIGCOMM Computer Communication, vol. 34 issue: 1, 2004, pp 51-56, doi: 10.1145/972374.972384.
    • (2004) ACM SIGCOMM Computer Communication , vol.34 , Issue.1 , pp. 51-56
    • Kreibich, C.1    Crowcroft, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.