Implementation of Honeypot Systems Based on the Potential Attack Graph
Crossref DOI link: https://doi.org/10.3103/S0146411621080460
Published Online: 2022-03-01
Published Print: 2021-12
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Zavadskii, E. V.
Ivanov, D. V.
Text and Data Mining valid from 2021-12-01
Version of Record valid from 2021-12-01
Article History
Received: 22 April 2021
Revised: 22 April 2021
Accepted: 28 April 2021
First Online: 1 March 2022
CONFLICT OF INTEREST
: The authors declare that they have no conflicts of interest.