Network Isolation and Security Using Honeypot
Saved in:
Main Author: | Foo, Ce Sheng |
---|---|
Format: | Final Year Project / Dissertation / Thesis |
Published: |
2019
|
Subjects: | |
Online Access: | http://eprints.utar.edu.my/3694/1/fyp_CN_2019_FCS_1505137.pdf http://eprints.utar.edu.my/3694/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004) -
Honeypot setup for education
by: Shahabudin, Muhd Harith Fathillah
Published: (2005) -
Implementing honeypot LAN detection
by: Amran, Salleh
Published: (2005) -
Improving exposure of intrusion deception system through implementation of hybrid honeypot
by: Mansoori, Masood, et al.
Published: (2012) -
Analysis of effectiveness of honeypots in tracking botnets
by: Shooshtari , Mohammad Jorjor Zadeh
Published: (2010)