DOCUMENT RESOURCES FOR EVERYONE
Documents Honey Pot

Information Warfare: Understanding Network Threats through Honeypot Deployment Greg M. Bednarski and Jake Branson March, 2004 Carnegie Mellon University 1 Table of Contents…

Documents Shiva User Manual

1 The work is licensed under Creative Commons ShareAlike license. http://creativecommons.org/licenses/by-sa/3.0/ SHIVA (Spam Honeypot with Intelligent Virtual Analyzer) The…