To search, Click
below search items.
|
|
All
Published Papers Search Service
|
Title
|
Comparison of Honeypot System, Types, and Tools
|
Author
|
Muhammad Junaid Iqbal, Muhammad Usman Ahmed, Muhammad Asaf
|
Citation |
Vol. 23 No. 11 pp. 169-177
|
Abstract
|
Network security is now more crucial than ever for consumers, companies, and military clients. Security has elevated to the top of the priority list since the Internet's creation. The evolution of security technology is now better understood. The area of community protection as a whole is broad and dynamic. News from the days before the internet and more recent advancements in community protection are both included in the topic of observation. Recognize current research techniques, previous Defence strategies that were significant, and network attack techniques that have been used before. The security of various domain names is the subject of this article's description of bibliographic research.
|
Keywords
|
Internet, information security, and bibliography research
|
URL
|
http://paper.ijcsns.org/07_book/202311/20231121.pdf
|
|