no code implementations • 25 Jun 2017 • Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha
This paper then examines how analysis of honeypot data can be used in employee information security awareness and education training.
Cryptography and Security Computers and Society