Article
Licensed
Unlicensed Requires Authentication

Reactive Security – Intrusion Detection, Honeypots, and Vulnerability Assessment

  • , and
Published/Copyright: December 14, 2007
Become an author with De Gruyter Brill
PIK - Praxis der Informationsverarbeitung und Kommunikation
From the journal Volume 27 Issue 4

Published Online: 2007-12-14
Published in Print: 2004-December

© Copyright by K.G. Saur Verlag 2004

Downloaded on 12.4.2026 from https://www.degruyterbrill.com/document/doi/10.1515/PIKO.2004.186/html
Scroll to top button