共 10 条
[1]
[2]
[3]
[4]
[5]
[6]
Honeypot detection in advanced botnet attacks.[J].Ping Wang; Lei Wu; Ryan Cunningham; Cliff C. Zou.Int. J. of Information and Computer Security.2010, 1
[7]
Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams.[J].Craig M. McRae;Robert Wesley McGrew;Rayford B. Vaughn.Journal of Digital Forensic Practice.2006, 3
[8]
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots.[J].Georgios Portokalidis;Herbert Bos.Computer Networks.2006, 5
[10]
Scalability; fidelity; and containment in the potemkin virtual honeyfarm.[J].Michael Vrable;Justin Ma;Jay Chen;David Moore;Erik Vandekieft;Alex C. Snoeren;Geoffrey M. Voelker;Stefan Savage.ACM SIGOPS Operating Systems Review.2005, 5

