Inproceedings,

The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks.

, , , , and .
IAW, page 92-99. IEEE, (2003)

Meta data

Tags

Users

  • @dblp

Comments and Reviews