Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
142 | Lance Spitzner |
The Honeynet Project: Trapping the Hackers. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
Honeynet Project, early warning and prediction, distributed honeynets, Honeypots, information gathering, honeynets |
116 | Kevin Curran, Colman Morrissey, Colm Fagan, Colm Murphy, Brian O'Donnell, Gerry Fitzpatrick, Stephen Condit |
Monitoring hacker activity with a Honeynet. |
Int. J. Netw. Manag. |
2005 |
DBLP DOI BibTeX RDF |
|
112 | Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford |
An Attacker-Defender Game for Honeynets. |
COCOON |
2009 |
DBLP DOI BibTeX RDF |
|
105 | Wei Ren 0002, Hai Jin 0001 |
Honeynet based distributed adaptive network forensics and active real time investigation. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
network, network security, digital forensics, computer forensics, honeynet, network forensics |
100 | George Chamales |
The Honeywall CD-ROM. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
honeywall, blackhat, honeypot, hackers, honeynet |
93 | Chih-Hung Chang |
A Low-Cost Green IT Design and Application of VHSP Based on Virtualization Technology. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
79 | Narisa Zhao, Xianfeng Zhang |
The Worm Propagation Model and Control Strategy Based on Distributed Honeynet. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Zhichun Li, Anup Goyal, Yan Chen 0004, Vern Paxson |
Automating analysis of large-scale botnet probing events. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
global property extrapolation, scan strategy inference, situational awareness, botnet, statistical inference, honeynet |
63 | Christopher P. Lee 0001, John A. Copeland |
Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
network attack analysis, team collaboration, user interfaces, information visualization, tagging, folksonomy, parallel coordinates, honeynet |
63 | Jeremiah K. Jones, Gordon W. Romney |
Honeynets: an educational resource for IT security. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
IT educational resource, information technology, honeypot, information assurance, curricula, honeynet, security education |
63 | Bill McCarty |
Botnets: Big and Bigger. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
honeypot, botnet, honeynet |
60 | Mark Ryan del Moral Talabis |
Honeynet learning: discovering IT security. |
ACM SIGCSE Bull. |
2006 |
DBLP DOI BibTeX RDF |
IT education, problem-based learning, Honeynets, IT security |
60 | Bill McCarty |
The Honeynet Arms Race. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
data-capture tools, honeynets, data capture |
56 | Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
Security, Honeypots, Forensics, Honeynets |
56 | Bill McCarty |
Automated Identity Theft. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC |
49 | Mohammed H. Sqalli, Shoieb Arshad, Mohammad Khalaf, Khaled Salah 0001 |
Identifying Scanning Activities in Honeynet Data Using Data Mining. |
CICSyN |
2011 |
DBLP DOI BibTeX RDF |
Data Mining, Intrusion Detection, Scanning, Honeynet |
44 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
Using Honeynets to Protect Large Enterprise Networks. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
firewall, honeypot, honeynet |
42 | Birger Tödtmann, Stephan Riebach, Erwin P. Rathgeb |
The Honeynet Quarantine: Reducing Collateral Damage Caused by Early Intrusion Response. |
ICN |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Michael O'Leary, Shiva Azadegan, Jay Lakhani |
Development of a Honeynet Laboratory: a Case Study. |
SNPD |
2006 |
DBLP DOI BibTeX RDF |
computer security, Honeynets, security education |
37 | Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier |
Automating the Analysis of Honeypot Data (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Internet threats analysis, malicious behavior characterization, Honeypots |
23 | Liang Zhao, Satoru Kobayashi, Kensuke Fukuda |
Exploring the Discovery Process of Fresh IPv6 Prefixes: An Analysis of Scanning Behavior in Darknet and Honeynet. |
PAM (1) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Marco Lucchese, Massimo Merro, Federica Paci, Nicola Zannone |
Towards A High-interaction Physics-aware Honeynet for Industrial Control Systems. |
SAC |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Marco Lucchese, Francesco Lupia, Massimo Merro, Federica Paci, Nicola Zannone, Angelo Furfaro |
HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems. |
ARES |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Alexios Lekidis, George Daniil, Panagiotis Mavrommatis, Konstantinos Lampropoulos 0001, Odysseas G. Koufopavlou |
AMINet: An Industrial Honeynet for AMI Systems. |
IEEE Big Data |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Navroop Kohli, Sanjeev Kumar, Rakesh Kumar Sehgal |
SDN-based Intelligent Honeynet Architecture for Averting Attacks. |
ICCCNT |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Jeroen Pijpker, Stephen James McCombie |
A Ship Honeynet to Gather Cyber Threat Intelligence for the Maritime Sector. |
LCN |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Kushnian Kour, Subhashish Goswami, Meenakshi Sharma, P. Thiruvannamalai SivaSankar, Vipul Vekariya, Alka Kumari |
Honeynet Implementation in Cyber Security Attack Prevention with Data Monitoring System Using AI Technique and IoT 4G Networks. |
Int. J. Commun. Networks Inf. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Liang Tan 0001, Keping Yu, Fangpeng Ming, Xiaofan Cheng, Gautam Srivastava 0001 |
Secure and Resilient Artificial Intelligence of Things: A HoneyNet Approach for Threat Detection and Situational Awareness. |
IEEE Consumer Electron. Mag. |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Xiaoyu Du, Guanying Zhou, Yujing Wang, Song Tao |
A Lightweight Honeynet Design In the Internet of Things. |
TrustCom |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Matej Zuzcák, Petr Bujok |
Using honeynet data and a time series to predict the number of cyber attacks. |
Comput. Sci. Inf. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Jianguo Ren, Chunming Zhang, Qihong Hao |
A theoretical method to evaluate honeynet potency. |
Future Gener. Comput. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Audrey Asante, Vincent Amankona |
Digital Forensic Readiness Framework based on Honeypot and Honeynet for BYOD. |
J. Digit. Forensics Secur. Law |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Chuan Sheng, Yu Yao, Qiang Fu 0005, Wei Yang, Ying Liu |
Study on the intelligent honeynet model for containing the spread of industrial viruses. |
Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Antonina Kashtalian, Tomas Sochor |
K-means Clustering of Honeynet Data with Unsupervised Representation Learning. |
IntelITSIS |
2021 |
DBLP BibTeX RDF |
|
23 | Jing Tao, A. Chen, Kai Liu, Kailiang Chen, Fengyuan Li, Peng Fu |
Recommendation Method of Honeynet Trapping Component Based on LSTM. |
DASC/PiCom/CBDCom/CyberSciTech |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Paul Lackner |
How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey. |
ICEIS (2) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Qiang Fu 0005, Yu Yao, Chuan Sheng, Wei Yang |
Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Weizhe Zhang, Bin Zhang 0048, Ying Zhou, Hui He, Zeyu Ding 0003 |
An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks. |
IEEE Internet Things J. |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Matej Zuzcák, Milan Zenka |
Expert system assessing threat level of attacks on a hybrid SSH honeynet. |
Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Jianguo Ren, Chunming Zhang |
A differential game method against attacks in heterogeneous honeynet. |
Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Tong Kong, Liming Wang, Duohe Ma, Zhen Xu 0009, Qian Yang, Zhitong Lu, Yijun Lu |
Automated Honeynet Deployment Strategy for Active Defense in Container-based Cloud. |
HPCC/DSS/SmartCity |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Desheng Zhang, Lei Chen |
Benefit Optimization of SDN Honeynet System Based on Mimic Defense. |
SimuTools (2) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Kanghua Cao, Weiwei Dong, Jinliang Wang, Lin Zhou, Yong Wang |
基于虚拟蜜网的用电信息采集系统攻击检测方法 (Attack Detection Method for Electricity Information Collection System Based on Virtual Honeynet). |
计算机科学 |
2019 |
DBLP BibTeX RDF |
|
23 | Stamatia Triantopoulou, Dimitrios Papanikas, Panayiotis Kotzanikolaou |
An Experimental Analysis of Current DDoS attacks Based on a Provider Edge Router Honeynet. |
IISA |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Zhiqiang Wang 0006, Gefei Li 0003, Yaping Chi, Jianyi Zhang, Qixu Liu, Tao Yang, Wei Zhou |
Honeynet Construction Based on Intrusion Detection. |
CSAE |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Suman Bhunia, Edward Miles, Shamik Sengupta, Felisa J. Vázquez-Abad |
CR-Honeynet: A Cognitive Radio Learning and Decoy-Based Sustenance Mechanism to Avoid Intelligent Jammer. |
IEEE Trans. Cogn. Commun. Netw. |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Bahman Rashidi, Carol J. Fung, Kevin W. Hamlen, Andrzej Kamisinski |
HoneyV: A virtualized honeynet system based on network softwarization. |
NOMS |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Zakariya Ammar, Ahmad Alsharif |
Deployment of IoT-based honeynet model. |
ICIT |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Wenjun Fan, David Fernández 0002, Zhihui Du |
Versatile virtual honeynet management framework. |
IET Inf. Secur. |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Danny Velasco, Glen Dario Rodriguez Rafael |
A review of the current state of Honeynet architectures and tools. |
Int. J. Secur. Networks |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Jinwoo Kim, Seungwon Shin |
Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks. |
DSN Workshops |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Sukwha Kyung, Wonkyu Han, Naveen Tiwari, Vaibhav Hemant Dixit, Lakshmi Srinivas, Ziming Zhao 0001, Adam Doupé, Gail-Joon Ahn |
HoneyProxy: Design and implementation of next-generation honeynet via SDN. |
CNS |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Xiangjun Meng, Zhifeng Zhao, Rongpeng Li, Honggang Zhang 0001 |
An intelligent honeynet architecture based on software defined security. |
WCSP |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Daisuke Mashima, Binbin Chen 0001, Prageeth Gunathilaka, Edwin Lesmana Tjiong |
Towards a grid-wide, high-fidelity electrical substation honeynet. |
SmartGridComm |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Wonkyu Han, Ziming Zhao 0001, Adam Doupé, Gail-Joon Ahn |
HoneyMix: Toward SDN-based Intelligent Honeynet. |
SDN-NFV@CODASPY |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Andres Manzano, José Naranjo, Ivan Bernal, David Mejia |
A prototype for a honeynet based on SDN. |
EATIS |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Amos O. Olagunju, Farouk Samu |
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Juha Nurmi, Joona Kannisto, Markku Vajaranta |
Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet. |
AsiaJCIS |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Suman Bhunia, Shamik Sengupta, Felisa J. Vázquez-Abad |
Performance analysis of CR-honeynet to prevent jamming attack through stochastic modeling. |
Pervasive Mob. Comput. |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Neha Agrawal, Shashikala Tapaswi |
Wireless Rogue Access Point Detection Using Shadow Honeynet. |
Wirel. Pers. Commun. |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Wenjun Fan, David Fernández 0002, Víctor A. Villagrá |
Technology Independent Honeynet Description Language. |
MODELSWARD |
2015 |
DBLP DOI BibTeX RDF |
|
23 | W. Owen Redwood, Joshua Lawrence, Mike Burmester |
A Symbolic Honeynet Framework for SCADA System Threat Intelligence. |
Critical Infrastructure Protection |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Ling Xue, Wei Lu 0018 |
Profiling Behavior of Intruders on Enterprise Honeynet: Deployment and Analysis. |
CONF-IRM |
2015 |
DBLP BibTeX RDF |
|
23 | Wenjun Fan, David Fernández 0002, Zhihui Du |
Adaptive and Flexible Virtual Honeynet. |
MSPN |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Alexandru Vlad Serbanescu, Sebastian Obermeier 0001, Der-Yeuan Yu |
ICS Threat Analysis Using a Large-Scale Honeynet. |
ICS-CSR |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Alexandru Vlad Serbanescu, Sebastian Obermeier 0001, Der-Yeuan Yu |
A Scalable Honeynet Architecture for Industrial Control Systems. |
ICETE (Selected Papers) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Mark Stockman, Robert Heile, Anthony Rein |
An Open-Source Honeynet System to Study System Banner Message Effects on Hackers. |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Boniface Kayode Alese, R. A. Akingbola, Folasade Mojisola Dahunsi, Olumide S. Adewale, T. J. Ogundele |
Improving deception in honeynet: Through data manipulation. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Pavol Sokol |
Legal issues of honeynet's generations. |
ECAI |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Michael Haney, Mauricio Papa |
A framework for the design and deployment of a SCADA honeynet. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Suman Bhunia, Shamik Sengupta, Felisa J. Vázquez-Abad |
CR-Honeynet: A Learning & Decoy Based Sustenance Mechanism against Jamming Attack in CRN. |
MILCOM |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Frank Yeong-Sung Lin, Yu-Shun Wang, Ming-Yang Huang |
Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet. |
J. Appl. Math. |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Dirk Hoffstadt, Niels Wolff, Stefan Monhof, Erwin P. Rathgeb |
Improved detection and correlation of multi-stage VoIP attack patterns by using a Dynamic Honeynet System. |
ICC |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Markus Gruber, Christian Schanes, Florian Fankhauser, Martin Moutran, Thomas Grechenig |
Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Christopher Hecker, Brian Hay |
Automated Honeynet Deployment for Dynamic Network Environment. |
HICSS |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Markus Gruber, Christian Schanes, Florian Fankhauser, Thomas Grechenig |
Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynet. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Iksu Kim, Myungho Kim |
Agent-based honeynet framework for protecting servers in campus networks. |
IET Inf. Secur. |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Álvaro Herrero 0001, Urko Zurutuza, Emilio Corchado |
A Neural-Visualization IDS for Honeynet Data. |
Int. J. Neural Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Haifeng Wang, Qingkui Chen |
Dynamic Deploying Distributed Low-interaction Honeynet. |
J. Comput. |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Yi-Lang Tsai, Bo-Yi Lee, Jee-Gong Chang |
Automated Malware Analysis Framework with Honeynet Technology in Taiwan Campuses. |
ICPADS |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Dongwoo Kwon, James Won-Ki Hong, Hong-Taek Ju |
DDoS attack forecasting system architecture using Honeynet. |
APNOMS |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Dirk Hoffstadt, Alexander Marold, Erwin P. Rathgeb |
Analysis of SIP-Based Threats Using a VoIP Honeynet System. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Yosra Ben Mustapha, Hervé Debar, Grégoire Jacob |
Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford |
Honeynet games: a game theoretic approach to defending network monitors. |
J. Comb. Optim. |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Tian-Hua Liu, Xiu-shuang Yi, Shi-Wei Ma |
Core Functions Analysis and Example Deployment of Virtual Honeynet. |
RVSP |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Markus Gruber, Florian Fankhauser, Stefan Taber, Christian Schanes, Thomas Grechenig |
Trapping and analyzing malicious VoIP traffic using a honeynet approach. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
23 | Markus Gruber, Florian Fankhauser, Stefan Taber, Christian Schanes, Thomas Grechenig |
Security Status of VoIP Based on the Observation of Real-World Attacks on a Honeynet. |
SocialCom/PASSAT |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Mohammed H. Sqalli, Syed Naeem Firdous, Khaled Salah 0001, Marwan H. Abu-Amara |
Identifying network traffic features suitable for honeynet data analysis. |
CCECE |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Urko Zurutuza, Enaitz Ezpeleta, Álvaro Herrero 0001, Emilio Corchado |
Visualization of Misuse-Based Intrusion Detection: Application to Honeynet Data. |
SOCO |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Mohammed H. Sqalli, Syed Naeem Firdous, Zubair A. Baig, Farag Azzedin |
An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic. |
CW |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Frank Yeong-Sung Lin, Yu-Shun Wang, Po-Hao Tsang |
Efficient defense strategies to minimize attackers' success probabilities in honeynet. |
IAS |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Mohammed H. Sqalli, Raed Al-Shaikh, Ezzat Ahmed |
Towards Simulating a Virtual Distributed Honeynet at KFUPM: A Case Study. |
EMS |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Michal Szczepanik, Ireneusz J. Jozwiak |
Detecting Malwares in Honeynet Using a Multi-agent System. |
NDT (2) |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Haifeng Wang, Qingkui Chen |
Design of cooperative deployment in distributed Honeynet system. |
CSCWD |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Mohammed H. Sqalli, Raed Al-Shaikh, Ezzat Ahmed |
A Distributed Honeynet at KFUPM: A Case Study. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Michal Szczepanik, Ireneusz J. Józwiak |
Detecting New and Unknown Malwares Using Honeynet. |
MISSI |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Izzeldin Amin |
Polymorphic Worm Detection Using Double-Honeynet. |
ICSEA |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Jan Kohlrausch |
Experiences with the NoAH Honeynet Testbed to Detect new Internet Worms. |
IMF |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Olivier Thonnard, Marc Dacier |
A framework for attack patterns' discovery in honeynet data. |
Digit. Investig. |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Zhichun Li, Anup Goyal, Yan Chen 0004 |
Honeynet-based Botnet Scan Traffic Analysis. |
Botnet Detection |
2008 |
DBLP DOI BibTeX RDF |
|