Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks.
Resource URI: https://dblp.l3s.de/d2r/resource/publications/conf/hci/Endicott-PopovskyNSFOA09
Home
|
Example Publications
Property
Value
dcterms:
bibliographicCitation
<
http://dblp.uni-trier.de/rec/bibtex/conf/hci/Endicott-PopovskyNSFOA09
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Barbara_Endicott-Popovsky
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Chiraag_Uday_Aval
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Christian_Seifert
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Deborah_A._Frincke
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Julia_Narvaez
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Lori_Ross_O%27Neil
>
foaf:
homepage
<
http://dx.doi.org/doi.org%2F10.1007%2F978-3-642-02812-0%5F17
>
foaf:
homepage
<
https://doi.org/10.1007/978-3-642-02812-0_17
>
dc:
identifier
DBLP conf/hci/Endicott-PopovskyNSFOA09
(xsd:string)
dc:
identifier
DOI doi.org%2F10.1007%2F978-3-642-02812-0%5F17
(xsd:string)
dcterms:
issued
2009
(xsd:gYear)
rdfs:
label
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks.
(xsd:string)
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Barbara_Endicott-Popovsky
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Chiraag_Uday_Aval
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Christian_Seifert
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Deborah_A._Frincke
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Julia_Narvaez
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Lori_Ross_O%27Neil
>
swrc:
pages
138-147
(xsd:string)
dcterms:
partOf
<
https://dblp.l3s.de/d2r/resource/publications/conf/hci/2009-16
>
owl:
sameAs
<
http://bibsonomy.org/uri/bibtexkey/conf/hci/Endicott-PopovskyNSFOA09/dblp
>
owl:
sameAs
<
http://dblp.rkbexplorer.com/id/conf/hci/Endicott-PopovskyNSFOA09
>
rdfs:
seeAlso
<
http://dblp.uni-trier.de/db/conf/hci/hci2009-16.html#Endicott-PopovskyNSFOA09
>
rdfs:
seeAlso
<
https://doi.org/10.1007/978-3-642-02812-0_17
>
swrc:
series
<
https://dblp.l3s.de/d2r/resource/conferences/hci
>
dc:
subject
deception; counter-deception; honeypots; drive-by-downloads; cyber-attacks
(xsd:string)
dc:
title
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks.
(xsd:string)
dc:
type
<
http://purl.org/dc/dcmitype/Text
>
rdf:
type
swrc:InProceedings
rdf:
type
foaf:Document