JOURNAL ARTICLE

Reactive Security – Intrusion Detection, Honeypots, and Vulnerability Assessment

M. MeierU. FlegelH. König

Year: 2004 Journal:   PIK - Praxis der Informationsverarbeitung und Kommunikation Vol: 27 (4)Pages: 186-187   Publisher: De Gruyter
Keywords:
Honeypot Vulnerability assessment Vulnerability (computing) Computer security Intrusion detection system Computer science Intrusion Geology Psychology

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.51
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Reactive Security – Intrusion Detection, Honeypots, and Vulnerability Assessment

Michael MeierUlrich FlegelHartmut König

Journal:   Technische Universität Dortmund Eldorado (Technische Universität Dortmund) Year: 2004
JOURNAL ARTICLE

Intrusion Detection Using Honeypots

Neeraj BhagatBhavna Arora

Year: 2018 Pages: 412-417
JOURNAL ARTICLE

Vulnerability Assessment using Honeypots

Maximillian DornseifFelix GärtnerThorsten Holz

Journal:   PIK - Praxis der Informationsverarbeitung und Kommunikation Year: 2004 Vol: 27 (4)Pages: 195-201
BOOK-CHAPTER

Evading Intrusion Detection Systems, Firewalls, and Honeypots

Ahmed Sheikh

Apress eBooks Year: 2021 Pages: 153-164
© 2026 ScienceGate Book Chapters — All rights reserved.