共 50 条
- [1] Detecting targeted attacks using shadow honeypots USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, 2005, : 129 - 144
- [2] Survey of Snaring Cyber Attacks on IoT Devices with Honeypots and Honeynets 2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
- [3] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
- [4] Detecting and Analyzing Zero-day Attacks using Honeypots 19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 543 - 548
- [5] Use of Honeypots for Mitigating DoS Attacks targeted on IoT Networks 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND SIGNAL PROCESSING (ICCCSP), 2017, : 11 - 14
- [6] Detecting network cyber-attacks using an integrated statistical approach Cluster Computing, 2021, 24 : 1435 - 1453
- [7] Detecting network cyber-attacks using an integrated statistical approach CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1435 - 1453
- [8] DeNNeS: deep embedded neural network expert system for detecting cyber attacks Neural Computing and Applications, 2020, 32 : 14753 - 14780
- [9] DeNNeS: deep embedded neural network expert system for detecting cyber attacks NEURAL COMPUTING & APPLICATIONS, 2020, 32 (18): : 14753 - 14780
- [10] Cyber Social Disruption due to Cyber Attacks PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 : 817 - 826