에이전트 기반의 공격 정보 수집 시스템 설계 및 구현
Vol. 17, No. 5, pp. 117-130,
10월.
2007
10.13089/JKIISC.2007.17.5.117, Full Text:
Keywords: computer security, Agent, signature, Honeypot, Intrusion
Abstract Statistics
Cite this article
10.13089/JKIISC.2007.17.5.117, Full Text:
Keywords: computer security, Agent, signature, Honeypot, Intrusion
Abstract Statistics
Cite this article
[IEEE Style]
I. Kim and M. Kim, "Design and Implementation of an Agent-Based System for Luring Hackers," Journal of The Korea Institute of Information Security and Cryptology, vol. 17, no. 5, pp. 117-130, 2007. DOI: 10.13089/JKIISC.2007.17.5.117.
[ACM Style]
Ik-Su Kim and Myung-Ho Kim. 2007. Design and Implementation of an Agent-Based System for Luring Hackers. Journal of The Korea Institute of Information Security and Cryptology, 17, 5, (2007), 117-130. DOI: 10.13089/JKIISC.2007.17.5.117.