Number | Name | Date | Kind |
---|---|---|---|
6112239 | Kenner et al. | Aug 2000 | A |
6363489 | Comay et al. | Mar 2002 | B1 |
6408391 | Huff et al. | Jun 2002 | B1 |
6442696 | Wray et al. | Aug 2002 | B1 |
6493752 | Lee et al. | Dec 2002 | B1 |
6578147 | Shanklin et al. | Jun 2003 | B1 |
Entry |
---|
SC Magazine, “Intrusion Detection,” Jun. 2000, from http://www.scmagazine.com/scmagazine.com/scmagazine/2000_06/testc/prod1.html, printout pp. 1-11.* |
Brenton, “Honeynets,” Oct. 16, 2000, from www.ists.dartmouth.edu/IRIA/knowledge_base/honeynets.pdf, pp. 1-8.* |
Spitzner, “To Build a Honeypot,” Jun. 7, 2000, from http://newdata.box.sk/2000a/papers/honeypot.html, printout pp. 1-5.* |
Greenblatt, “CyberCop Protects Your Network,” Dec. 1997, Datamation, vol. 44, Issue 1 pp. 22-24. |