Install Honeypot and analyze results to find attack paths / threat profiles [article]

Απόστολος Τοπάλης, University Of Thessaly, Γεώργιος Σταμούλης
2022
doi:10.26253/heal.uth.14563 fatcat:e5thhnslbjavtfgnsdjcvlmbna