Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/iaw/LevineLOCC03
%A Levine, John G.
%A LaBella, Richard
%A Owen, Henry L.
%A Contis, Didier
%A Culver, Brian
%B IAW
%D 2003
%I IEEE
%K dblp
%P 92-99
%T The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks.
%U http://dblp.uni-trier.de/db/conf/iaw/iaw2003.html#LevineLOCC03
%@ 0-7803-7808-3
@inproceedings{conf/iaw/LevineLOCC03,
added-at = {2006-04-27T00:00:00.000+0200},
author = {Levine, John G. and LaBella, Richard and Owen, Henry L. and Contis, Didier and Culver, Brian},
biburl = {https://www.bibsonomy.org/bibtex/210a1ee8cbd5715a1c82a106d32aeda23/dblp},
booktitle = {IAW},
crossref = {conf/iaw/2003},
date = {2006-04-27},
description = {dblp},
interhash = {0405eff7db749d2fb6e728d2c90148da},
intrahash = {10a1ee8cbd5715a1c82a106d32aeda23},
isbn = {0-7803-7808-3},
keywords = {dblp},
pages = {92-99},
publisher = {IEEE},
timestamp = {2006-04-27T00:00:00.000+0200},
title = {The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks.},
url = {http://dblp.uni-trier.de/db/conf/iaw/iaw2003.html#LevineLOCC03},
year = 2003
}