Voir la notice de l'article provenant de la source Math-Net.Ru
@article{IZKAB_2012_2_a5, author = {L. K. Babenko and E. P. Tumoyan and K. V. Tsyganok}, title = {Working out an active system-trap}, journal = {News of the Kabardin-Balkar scientific center of RAS}, pages = {62--69}, publisher = {mathdoc}, number = {2}, year = {2012}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/IZKAB_2012_2_a5/} }
L. K. Babenko; E. P. Tumoyan; K. V. Tsyganok. Working out an active system-trap. News of the Kabardin-Balkar scientific center of RAS, no. 2 (2012), pp. 62-69. http://geodesic.mathdoc.fr/item/IZKAB_2012_2_a5/
[1] L. Spitzner, Honeypots: Tracking Hackers, New-York, Addison-Wesley, 2002, 429 pp.
[2] N. Provos, T. Holz, Virtual Honeypots: From Botnet Tracking to Intrusion Detection, New-York, Addison-Wesley, 2007, 440 pp.
[3] Yi-Min Wang, D. Beck, Xuxian Jiang, R. Roussev, C. Verbowski, Shuo Chen, S. King, “Automated Web Patrol with Strider HoneyMonkeys”, Proceedings of the 2006 Network and Distributed System Security Symposium, 2006, 35–49
[4] Jiyang Chen, O. R. Zaiane, An Unsupervised Approach to Cluster Web Search Results based on Word Sense Communities (Rezhim dostupa: svobodnyi, [Elektronnyi resurs]) http://webdocs.cs.ualberta.ca/~zaiane/postscript/WI08.pdf
[5] S. Carpineto, S. Osin'ski, G. Romano, D. Weiss, A Survey of Web Clustering Engines (Rezhim dostupa: svobodnyi, [Elektronnyi resurs]) http://search.fub.it/claudio/pdf/CSUR09.pdf
[6] R. S. Shelke, D. S. Thakore, Cluster Based Web Search Using Support Vector Machine (Rezhim dostupa: svobodnyi, [Elektronnyi resurs]) http://www.cscjournals.org/csc/manuscript/Journals/IJE/volume5/Issue1/IJE 242.pdf
[7] E. P. Tumoyan, A. L. Rechkov, “Metody analiza vredonosnogo programmnogo obespecheniya”, Aktualnye aspekty zaschity informatsii v Yuzhnom federalnom universitete, eds. Pod red. O.B. Makarevicha, Izd-vo TTI YuFU, Taganrog, 2011, 94–101 (Monografiya)