Counteracting Information Threats Using Honeypot Systems Based on a Graph of Potential Attacks
Crossref DOI link: https://doi.org/10.3103/S0146411622080260
Published Online: 2023-02-28
Published Print: 2022-12
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Zavadskii, E. V.
Ivanov, D. V.
Text and Data Mining valid from 2022-12-01
Version of Record valid from 2022-12-01
Article History
Received: 22 April 2021
Revised: 22 April 2021
Accepted: 28 April 2021
First Online: 28 February 2023
CONFLICT OF INTEREST
: The authors declare that they have no conflicts of interest.