共 50 条
- [1] Application of network intrusion deception technology - Honeypot system Jisuanji Gongcheng, 2006, 13 (176-178+181):
- [2] Network intrusion detection system based on Honeypot technology Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (02): : 257 - 259
- [3] Enhancing network intrusion detection system with honeypot IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 1521 - 1526
- [4] HonIDS: Enhancing honeypot system with intrusion detection models FOURTH IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2006, : 135 - +
- [5] Integrated Intrusion Detection and Prevention System with Honeypot in Cloud Computing 2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 95 - 100
- [6] Raspberry Pi as an Intrusion Detection System, a Honeypot and a Packet Analyzer PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 80 - 85
- [7] Honeypot-Based Intrusion Detection System: A Performance Analysis PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2347 - 2351
- [8] The Application of Data Mining Technology in the Intrusion Detection System THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 208 - 211
- [9] Application of data mining technology to intrusion detection system DCABES 2004, Proceedings, Vols, 1 and 2, 2004, : 1027 - 1030
- [10] A dynamic honeypot design for intrusion detection IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2004, : 95 - 104