Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.]
Honeypots have become invaluable tools in the field of cybersecurity, allowing researchers to gain insights into attacker behaviour, collect data on malicious activities, and develop effective defence strategies. Traditionally, honeypots relied on rule-based approaches...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
UiTM Cawangan Perlis
2024
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/103968/1/103968.pdf https://ir.uitm.edu.my/id/eprint/103968/ https://jcrinn.com/index.php/jcrinn |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|