has been cited by the following article(s):
[1]
|
Deceptive directories and “vulnerable” logs: a honeypot study of the LDAP and log4j attack landscape
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW),
2022
DOI:10.1109/EuroSPW55150.2022.00052
|
|
|
[2]
|
Authentication and Authorization in FELIX
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC),
2015
DOI:10.1109/UCC.2015.98
|
|
|