Now 750 visitors
Today:454 Yesterday:362
Total: 3263 413S 88P 97R
2026-04-13, Week 16
Member Login
Welcome Message
Statistics & History
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration & Invoice
Paper Archives
Outstanding Papers
Program & Proceedings
Presentation Platform
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors




















IEEE/ICACT20230048 Question.6
Questioner: h22001iy@edu.tuis.ac.jp    2023-02-20 ¿ÀÈÄ 2:54:04
IEEE/ICACT20230048 Answer.6
Answer by Auhor lchen@mail.ntust.edu.tw   2023-02-20 ¿ÀÈÄ 2:54:04
Thank you for your presentation. In this study, did you operate a honeypot, or did you obtain a dataset from a honeypot provider? Additionally, if you did operate a honeypot, could you please share any measures you took to attract attacks? Best regards, Hi, thank you for asking this question! Our dataset is obtained from the honeypot provider for subsequent analysis and research. In addition, our honeypot uses cowrie honeypot. Hope this answer helps you!

Select Voice