Now 741 visitors
Today:454 Yesterday:362
Total: 3277 413S 88P 97R
2026-04-13, Week 16
Member Login
Welcome Message
Statistics & History
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration & Invoice
Paper Archives
Outstanding Papers
Program & Proceedings
Presentation Platform
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors




















IEEE/ICACT20230048 Question.3
Questioner: ali.athar1401@gmail.com    2023-02-22 ¿ÀÈÄ 12:39:42
IEEE/ICACT20230048 Answer.3
Answer by Auhor lchen@mail.ntust.edu.tw   2023-02-22 ¿ÀÈÄ 12:39:42
Hello, Thank you for presenting this paper. Can you tell us more about the limitation of your research and your future plans to enhance your research work? Thank you. Thank you for your question. Because our Honeypot does not have important information like a real computer, many Payloads are only accessed, and there is no follow-up action. Therefore, the more threatening Payloads account for a small part and may be installed in the future. Other kinds of Honeypots can do the same analysis as cloth. Thank you. Best Regards.

Select Voice