Cite
An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic.
MLA
Sqalli, M. H., et al. “An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic.” 2011 International Conference on Cyberworlds (CW), Jan. 2011, pp. 23–30. EBSCOhost, https://doi.org/10.1109/CW.2011.35.
APA
Sqalli, M. H., Firdous, S. N., Baig, Z., & Azzedin, F. (2011). An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic. 2011 International Conference on Cyberworlds (CW), 23–30. https://doi.org/10.1109/CW.2011.35
Chicago
Sqalli, M.H., S.N. Firdous, Z. Baig, and F. Azzedin. 2011. “An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic.” 2011 International Conference on Cyberworlds (CW), January, 23–30. doi:10.1109/CW.2011.35.