Search results

Jump to navigation Jump to search
Result 1 of 1
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • ...ction 5.2.1.1) and the development of client honeypots based on the Cuckoo sandbox (see section 7.1.1) are possible selections.<br/> ...To combat the increasing cyber threat, CERTs need to cooperate and develop large-scale interconnected sensor networks in order to collect threat intelligenc
    6 KB (826 words) - 16:28, 7 February 2015