no code implementations • 21 Dec 2021 • Armin Ziaie Tabari, Xinming Ou, Anoop Singhal
While honeypots have been historically used as decoy devices to help researchers/organizations gain a better understanding of the dynamic of threats on a network and their impact, IoT devices pose a unique challenge for this purpose due to the variety of devices and their physical connections.
no code implementations • 23 Dec 2020 • Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu
Network attacks have become a major security concern for organizations worldwide and have also drawn attention in the academics.
Cryptography and Security