The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks (0)

by J Levine, R LaBella, H Owen, D Contis, B Culver
Venue:In Proceedings of the 2002 IEEE Workshop on Information Assurance and Security