[1] |
贾召鹏, 方滨兴, 刘潮歌 ,等. 网络欺骗技术综述[J]. 通信学报, 2017,38(12): 128-143.
|
|
JIA Z P , FANG BX , LIU C G ,et al. Survey on cyber deception[J]. Journal on Communications, 2017,38(12): 128-143.
|
[2] |
诸葛建伟, 唐勇, 韩心慧 ,等. 蜜罐技术研究与应用进展[J]. 软件学报, 2013,24(4): 825-842.
|
|
ZHUGE J W , TANG Y , HAN X H ,et al. Honeypot technology research and application[J]. Journal of Software, 2013,24(4): 825-842
|
[3] |
THOMPSON M F . Effects of a honeypot on the cyber grand challenge final event[J]. IEEE Security & Privacy, 2018,16(2): 37-41.
|
[4] |
JIA Z P , CUI X , LIU Q X ,et al. Micro-Honeypot:using browser fingerprinting to track attackers[C]// 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC),June 18-21,2018,Guangzhou,China. Piscataway:IEEE Press, 2018: 197-204.
|
[5] |
KUMAR S , SEHGAL R , BHATIA J S . Hybrid honeypot framework for malware collection and analysis[C]// 2012 IEEE 7th International Conference on Industrial and Information Systems (ICIIS),Aug 6-9,2012,Chennai,India. Piscataway:IEEE Press, 2012: 1-5.
|
[6] |
CHRISTOS K . Improving mobile core network security with Honeynets[J]. IEEE Security & Privacy, 2007,5(4): 40-47.
|
[7] |
ZAKARIA W Z , MAKSOM F M , ABDULLAH K . Observing the presence of mobile malwares using low-interaction honeypot[C]// 2016 IEEE Symposium on Computer Applications &Industrial Electronics (ISCAIE),May 30-31,2016,Batu Feringghi,Malaysia. Piscataway:IEEE Press, 2016: 117-121.
|
[8] |
SONG Y B , ZHU X Y , HONG Y L ,et al. A mobile communication honeypot observing system[C]// 4th International Conference on Multimedia Information Networking and Security,Nov 2-4,2012,Nanjing,China. Piscataway:IEEE Press, 2012: 861-865.
|
[9] |
ASIT M , TAPASWI S . A software router based predictive honeypot roaming scheme for network security and attack analysis[C]// 9th International Conference of Innovations in Information Technology(IIT),March 17-19,2013,Paphos,Cyprus.[S.l.:s.n. ], 2013: 221-226.
|
[10] |
ELIOT N , KENDALL D , BROCKWAY M . A flexible laboratory environment supporting honeypot deployment for teaching real-world cybersecurity skills[J]. IEEE Access, 2018(6): 34884-34895.
|
[11] |
邵艾青, 毕喜军, 庞浩 . 蜜罐系统与安管平台联动结合的研究与实践[J]. 电信科学, 2017,33(Z2): 256-261.
|
|
SHAO A Q , BI X J , PANG H . Research and practice of the combination of honeypot system and security management platform[J]. Telecommunications Science, 2017,33(Z2): 256-261.
|