ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
1
views
0
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,564
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Real-time distributed malicious traffic monitoring for honeypots and network telescopes
proceedings-article
Author(s):
Samuel Oswald Hunter
,
Barry Irwin
,
Etienne Stalmans
Publication date
(Print):
August 2013
Conference name:
2013 Information Security for South Africa
Conference date:
September 14, 2013 - September 16, 2013
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Exponential Random Graph Models
Author and article information
Conference
Publication date:
August 2013
Publication date (Print):
August 2013
Pages
: 1-9
Article
DOI:
10.1109/ISSA.2013.6641050
SO-VID:
d1f7cd49-faf7-4a7a-a633-544a0b408528
Copyright ©
© 2013
Conference name:
2013 Information Security for South Africa
Conference location:
Johannesburg, South Africa
Conference date:
September 14, 2013 - September 16, 2013
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,564
Malicious URL Detection Based on a Parallel Neural Joint Model
Authors:
Jianting Yuan
,
Guanxin Chen
,
Shengwei Tian
…
Malicious Domain Name Detection Based on Extreme Machine Learning
Authors:
Yong Shi
,
Gong Chen
,
Juntao Li
…
Research on Malicious URL Detection Based on Feature Contribution Tendency
Authors:
Shen He
,
Jun Xin
,
Huaxi Peng
…
See all similar
Cited by
1
Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization
Authors:
Claude Fachkha
,
Mourad Debbabi
See all cited by