Honeypots: Catching the Insider Threat
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Honeypots: concepts, approaches, and challenges
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Honeypot technologies and their applicability as a strategic internal countermeasure
International Journal of Information and Computer Security
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Hi-index | 0.00 |
Bioterrorism represents a serious threat to the security of civilian populations. The nature of an epidemic requires careful consideration of all possible vectors over which an infection can spread. Our work takes the SIR model and creates a detailed ...