4 research outputs found

    An entropy and volume-based approach for identifying malicious activities in honeynet traffic

    Full text link

    Identifying Malicious Activities in Honeynets using Clustering

    Get PDF
    corecore