"The Use of Honeynets to Detect Exploited Systems Across Large Enterprise ..."

John G. Levine et al. (2003)

Details and statistics

DOI:

access: unavailable

type: Conference or Workshop Paper

metadata version: 2006-04-27

a service of  Schloss Dagstuhl - Leibniz Center for Informatics