"Detecting Targeted Attacks Using Shadow Honeypots."

Kostas G. Anagnostakis et al. (2005)

Details and statistics

DOI:

access: open

type: Conference or Workshop Paper

metadata version: 2021-02-01