no code implementations • 18 Apr 2017 • Wenjun Fan, Zhihui Du, David Fernandez, Victor A. Villagra
Finally, the taxonomy is applied to a wide set of tools and systems in order to demonstrate its validity and predict the tendency of honeypot development.
Cryptography and Security