DASC   2006 Autonomic and Secure Computing Dependable
Wall of Fame | Most Viewed DASC-2006 Paper
11 years 11 days ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source277
2Download preprint from source266
3Download preprint from source251
4Download preprint from source236
5Download preprint from source228
6Download preprint from source226
7Download preprint from source223
8Download preprint from source216
9Download preprint from source205
10Download preprint from source198