IoT honeypot: A review from researcher's perspective
Internet of things; Malware; Security of data; Attack patterns; Deception toolkits; Honeypots; Malware attacks; Popular platform; Network security
Saved in:
Main Authors: | Razali M.F., Muruti G., Razali M.N., Jamil N., Mansor F.Z. |
---|---|
Other Authors: | 57208046981 |
Format: | Conference Paper |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Similar Items
-
IoT honeypot: A review from researcher's perspective
by: Razali, M.F., et al.
Published: (2020) -
Review of SCADA systems and IoT honeypots
by: Alquwatli, Mohammed H., et al.
Published: (2020) -
TPAL: A protocol for node authentication in IoT
by: Razali M.F., et al.
Published: (2023) -
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004) -
Honeypot setup for education
by: Shahabudin, Muhd Harith Fathillah
Published: (2005)