Title

Honeypots, honeynets and honeywalls - finding the right honey for luring the attacker

Document Type

Conference Proceeding

Faculty

Computing, Health and Science

School

School of Computer and Information Science

RAS ID

3073

Comments

This article was originally published as: Yek, S. (2005). Honeypots, honeynets and honeywalls - finding the right honey for luring the attacker. Proceedings of the 6th Australian Information Warfare & Security Conference. (pp. 188-194). Geelong, Victoria: Deakin University.

This document is currently not available here.

 
COinS