CORE
🇺🇦
make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Filters
4 research outputs found
An entropy and volume-based approach for identifying malicious activities in honeynet traffic
Author
Azzedin F
Baig Zubair
Firdous SN
Sqalli MH
Publication venue
'Institute of Electrical and Electronics Engineers (IEEE)'
Publication date
16/12/2011
Field of study
Full text link
Deakin Research Online
Identifying Malicious Activities in Honeynets using Clustering
Author
Publication venue
Publication date
Field of study
Get PDF
KFUPM ePrints
Identifying Malicious Activities in Honeynets using Clustering
Author
Publication venue
Publication date
Field of study
Get PDF