@dblp

The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks.

, , , , and . IAW, page 92-99. IEEE, (2003)

Description

dblp

Links and resources

Tags