|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 47 occurrences of 22 keywords
|
|
|
Results
Found 58 publication records. Showing 58 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
149 | Jeremiah K. Jones, Gordon W. Romney |
Honeynets: an educational resource for IT security. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
IT educational resource, information technology, honeypot, information assurance, curricula, honeynet, security education |
112 | Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
Security, Honeypots, Forensics, Honeynets |
92 | Shiva Azadegan, Vanessa McKenna |
Use of Honeynets in Computer Security Education. |
ACIS-ICIS |
2005 |
DBLP DOI BibTeX RDF |
Computer Security, Honeypots, Honeynets, Security Education |
69 | Lance Spitzner |
The Honeynet Project: Trapping the Hackers. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
Honeynet Project, early warning and prediction, distributed honeynets, Honeypots, information gathering, honeynets |
68 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
Using Honeynets to Protect Large Enterprise Networks. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
firewall, honeypot, honeynet |
65 | Bill McCarty |
The Honeynet Arms Race. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
data-capture tools, honeynets, data capture |
48 | Bill McCarty |
Automated Identity Theft. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC |
47 | Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford |
An Attacker-Defender Game for Honeynets. |
COCOON |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Robin E. Bloomfield, Ilir Gashi, Andrey Povyakalo, Vladimir Stankovic 0002 |
Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network. |
ISSRE |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Michael O'Leary, Shiva Azadegan, Jay Lakhani |
Development of a Honeynet Laboratory: a Case Study. |
SNPD |
2006 |
DBLP DOI BibTeX RDF |
computer security, Honeynets, security education |
27 | Jason M. Pittman, Shaho Alaee |
To What Extent Are Honeypots and Honeynets Autonomic Computing Systems? |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Amir Javadpour, Forough Ja'fari, Tarik Taleb, Chafika Benzaïd |
A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques. |
ICECCS |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Eric M. Toth, Md Minhaz Chowdhury |
Honeynets and Cloud Security. |
AIIoT |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac |
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. |
IEEE Commun. Surv. Tutorials |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac |
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
27 | Alejandro Molina Zarca, Jorge Bernal Bernabé, Antonio F. Skarmeta, José M. Alcaraz Calero |
Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks. |
IEEE J. Sel. Areas Commun. |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Chuan Sheng, Yu Yao, Dongbiao Li, Hongna An, Wei Yang |
Honeyeye: A Network Traffic Collection Framework for Distributed ICS Honeynets. |
ISPA/BDCloud/SocialCom/SustainCom |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Christos Dalamagkas, Panagiotis G. Sarigiannidis, Dimosthenis Ioannidis, Eider Iturbe, Odysseas Nikolis, Francisco Ramos 0003, Erkuden Rios, Antonios Sarigiannidis, Dimitrios Tzovaras |
A Survey On Honeypots, Honeynets And Their Applications On Smart Grid. |
NetSoft |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Xing Ling, Yeonwoo Rho, Chee-Wooi Ten |
Predicting Global Trend of Cybersecurity on Continental Honeynets Using Vector Autoregression. |
ISGT Europe |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Pavol Sokol, Jakub Mísek, Martin Husák |
Honeypots and honeynets: issues of privacy. |
EURASIP J. Inf. Secur. |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Markus Gruber, Dirk Hoffstadt, Adnan Aziz, Florian Fankhauser, Christian Schanes, Erwin P. Rathgeb, Thomas Grechenig |
Global VoIP security threats - large scale validation based on independent honeynets. |
Networking |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Pavol Sokol, Maros Andrejko |
Deploying Honeypots and Honeynets: Issues of Liability. |
CN |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Tomas Sochor, Matej Zuzcak |
Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection. |
CN |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Pavol Sokol, Martin Husák, Frantiek Liptak |
Deploying Honeypots and Honeynets: Issue of Privacy. |
ARES |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Pavol Sokol, Lenka Kleinova, Martin Husák |
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. |
EUROCON |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Napoleon Paxton, Dae-il Jang, Stephen Russell 0001, Gail-Joon Ahn, Ira S. Moskowitz, Paul Hyden |
Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis. |
HICSS |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Fahim H. Abbasi, Richard J. Harris 0001, Stephen Marsland, Giovanni S. Moretti |
An exemplar-based learning approach for detection and classification of malicious network streams in honeynets. |
Secur. Commun. Networks |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Peter Pisarcík, Pavol Sokol |
Framework for distributed virtual honeynets. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Tomas Sochor, Matej Zuzcak |
Study of Internet Threats and Attack Methods Using Honeypots and Honeynets. |
CN |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Mohammed H. Sqalli, Syed Naeem Firdous, Khaled Salah 0001, Marwan H. Abu-Amara |
Classifying malicious activities in Honeynets using entropy and volume-based thresholds. |
Secur. Commun. Networks |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias |
Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Manuel Gil Pérez, Verónica Mateos Lanchas, David Fernández Cambronero, Gregorio Martínez Pérez, Víctor A. Villagrá |
RECLAMO: Virtual and Collaborative Honeynets Based on Trust Management and Autonomous Systems Applied to Intrusion Management. |
CISIS |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Fahim H. Abbasi, Richard J. Harris 0001, Giovanni S. Moretti, Aun Haider, Nafees Anwar |
Classification of malicious network streams using honeynets. |
GLOBECOM |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Anton Chuvakin |
Honeypots and Honeynets. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Jordi Herrera-Joancomartí, Cristina Pérez-Solà |
Online Social Honeynets: Trapping Web Crawlers in OSN. |
MDAI |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Paul Barford, Yan Chen 0004, Anup Goyal, Zhichun Li, Vern Paxson, Vinod Yegneswaran |
Employing Honeynets For Network Situational Awareness. |
Cyber Situational Awareness |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Christopher Hecker, Brian Hay |
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support. |
HICSS |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Cristine Hoepers |
Design and implementation of an infrastructure for honeypots and honeynets' information exchange and analysis. |
|
2008 |
RDF |
|
27 | Christos K. Dimitriadis |
Improving Mobile Core Network Security with Honeynets. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Richard A. Wasniowski |
Using Honeynets and Alerts Correlation for Intrusion Detection and Prevention. |
Security and Management |
2007 |
DBLP BibTeX RDF |
|
27 | Christos K. Dimitriadis |
Honeynets in 3G - A Game Theoretic Analysis. |
WOSIS |
2006 |
DBLP BibTeX RDF |
|
27 | Maximillian Dornseif, Sascha May |
Modelling the costs and benefits of Honeynets |
CoRR |
2004 |
DBLP BibTeX RDF |
|
27 | Maximillian Dornseif, Thorsten Holz, Christian N. Klein |
NoSEBrEaK - Attacking Honeynets |
CoRR |
2004 |
DBLP BibTeX RDF |
|
27 | Richard Stevens, Hartmut Pohl |
Honeypots und Honeynets. |
Inform. Spektrum |
2004 |
DBLP DOI BibTeX RDF |
|
27 | John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver |
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. |
IAW |
2003 |
DBLP BibTeX RDF |
|
24 | John R. Lange, Peter A. Dinda, Fabián E. Bustamante |
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
volunteer systems, honeypots, honeynets, wormholes |
24 | Mark Ryan del Moral Talabis |
Honeynet learning: discovering IT security. |
ACM SIGCSE Bull. |
2006 |
DBLP DOI BibTeX RDF |
IT education, problem-based learning, Honeynets, IT security |
24 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics Part I: Analyzing the Network. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
blackhat, honeypots, honeynets |
24 | Neal Krawetz |
Anti-Honeypot Technology. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
spam, honeypots, honeynets, trackers |
24 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics, Part II: Analyzing the Compromised Host. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
network analysis, honeypots, honeynets |
20 | Robin Berthier, Dave Kormann, Michel Cukier, Matti A. Hiltunen, Gregg Vesonder, Daniel Sheleheda |
On the Comparison of Network Attack Datasets: An Empirical Analysis. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Leonard Kwan, Pradeep Ray, Greg Stephens |
Towards a Methodology for Profiling Cyber Criminals. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Zhichun Li, Lanjia Wang, Yan Chen 0004, Zhi Fu |
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms. |
ICNP |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Hao Tu, Zhitang Li, Bin Liu 0013 |
Detecting Botnets by Analyzing DNS Traffic. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, Raghu Ramakrishnan 0001 |
Toward a Query Language for Network Attack Data. |
ICDE Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
20 | W. Timothy Strayer, Robert Walsh, Carl Livadas, David E. Lapsley |
Detecting Botnets with Tight Command and Control. |
LCN |
2006 |
DBLP DOI BibTeX RDF |
|
20 | George Chamales |
The Honeywall CD-ROM. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
honeywall, blackhat, honeypot, hackers, honeynet |
Displaying result #1 - #58 of 58 (100 per page; Change: )
|
|