z-logo
open-access-imgOpen Access
Main parameters for information security intruder identification
Author(s) -
Андрій Іванович Гізун,
Владислава Вікторівна Волянська,
Вікторія Олександрівна Риндюк,
Sergiy Gnatyuk
Publication year - 2013
Publication title -
zahist ìnformacìï
Language(s) - Uncategorized
Resource type - Journals
eISSN - 2410-7840
pISSN - 2221-5212
DOI - 10.18372/2410-7840.15.4221
Subject(s) - honeypot , identification (biology) , computer science , normative , computer security , information security , set (abstract data type) , intrusion detection system , intrusion , philosophy , botany , geochemistry , epistemology , biology , programming language , geology

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here