Return to Article Details Characterizing Honeypot-Captured Cyber-attacks: Statistical Framework and Case Study Download Download PDF