The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Honeypot with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2004 (29) 2005-2006 (34) 2007 (22) 2008 (21) 2009 (26) 2010 (20) 2011-2012 (33) 2013 (16) 2014-2015 (31) 2016 (25) 2017 (24) 2018 (34) 2019 (45) 2020 (32) 2021 (51) 2022 (33) 2023 (56) 2024 (9)
Publication types (Num. hits)
article(178) book(1) incollection(1) inproceedings(356) phdthesis(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 140 occurrences of 68 keywords

Results
Found 541 publication records. Showing 541 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
134Sherif M. Khattab, Rami G. Melhem, Daniel Mossé, Taieb Znati Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
105Yuqing Mai, Radhika Upadrashta, Xiao Su J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
102Xuxian Jiang, Xinyuan Wang 0005 "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
90Anh-Quynh Nguyen, Yoshiyasu Takefuji Towards an Invisible Honeypot Monitoring System. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
87Cormac Herley, Dinei A. F. Florêncio Protecting Financial Institutions from Brute-Force Attacks. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
79Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun 0001 Real-Time Emulation of Intrusion Victim in HoneyFarm. Search on Bibsonomy AWCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interception proxy, reverse firewall, Honeypot, intrusion
75Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang HonIDS: Enhancing Honeypot System with Intrusion Detection Models. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
75Junfeng Tian, Jian-ling Wang, Xiao-hui Yang, Ren-ling Li A Study of Intrusion Signature Based on Honeypot. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
75Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky Honeypot Forensics Part I: Analyzing the Network. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF blackhat, honeypots, honeynets
75Neal Krawetz Anti-Honeypot Technology. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF spam, honeypots, honeynets, trackers
75Iyad Kuwatly, Malek Sraj, Zaid Al Masri, Hassan Artail A Dynamic Honeypot Design for Intrusion Detection. Search on Bibsonomy ICPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
73Eric Alata, Ion Alberdi, Vincent Nicomette, Philippe Owezarski, Mohamed Kaâniche Internet attacks monitoring with dynamic connection redirection mechanisms. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
67Anjali Sardana, Ramesh Chandra Joshi Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Routing, DDoS, Honeypot
67Zaiyao Yi, Liuqing Pan, Xinmei Wang, Chen Huang 0003, Benxiong Huang IP Traceback Using Digital Watermark and Honeypot. Search on Bibsonomy UIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IP Tracebak, digital watermark, honeypot
67Huidong Jin 0001, Olivier Y. de Vel, Ke Zhang, Nianjun Liu Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks. Search on Bibsonomy Australasian Conference on Artificial Intelligence The full citation details ... 2008 DBLP  DOI  BibTeX  RDF density-based cluster visualisation, honeypot data, Knowledge discovery, outlier detection, botnet, Internet security
67Geng Yang, Chunming Rong, Yunping Dai A Distributed Honeypot System for Grid Security. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Distributed System, Grid Computing, Network Security, Honeypot
61Babak Khosravifar, Jamal Bentahar An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Chao-Hsi Yeh, Chung-Huang Yang Design and implementation of honeypot systems based on open-source software. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Cliff Changchun Zou, Ryan Cunningham Honeypot-Aware Advanced Botnet Construction and Maintenance. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
61Miyoung Kim, Misun Kim, Youngsong Mun Design and Implementation of the HoneyPot System with Focusing on the Session Redirection. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
61Miyoung Kim, Misun Kim, Hyewon K. Lee, Youngsong Mun Design of Active HoneyPot System. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
58Takashi Minohara, Satoshi Ishikawa, Masahiro Amano Centralized Surveillance of Unused Address Space by using Virtual Networks. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
58W. Y. Chin, Evangelos P. Markatos, Spyros Antonatos, Sotiris Ioannidis HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF honeypot infrastructures, security, honeypot
52Pei-Sheng Huang, Chung-Huang Yang, Tae-Nam Ahn Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection system, firewall, malware, worm, honeypot
52Ming-Yang Su, Kai-Chi Chang, Chun-Yuen Lin Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Frequent Episodes Mining, Honeypot systems, Network Security
52Erwin P. Rathgeb, Dirk Hoffstadt The E-Mail Honeypot System Concept, Implementation and Field Test Results. Search on Bibsonomy ICDS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Spam, Phishing, Honeypot
50Lokesh D. Pathak, Ben Soh Incorporating Data Mining Tools into a New Hybrid-IDS to Detect Known and Unknown Attacks. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Fault Tolerance, Network Security, Honeypot
50Brian Hernacki, Jeremy Bennett, Thomas Lofgren Symantec Deception Server Experience with a Commercial Deception System. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ManTrap, Honeypot, Deception
50Nathalie Weiler Honeypots for Distributed Denial of Service Attacks. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Security Practices, Honeypot, Distributed Denial of Service Attacks
46Kyumin Lee, James Caverlee, Steve Webb The social honeypot project: protecting online communities from spammers. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF social honeypots, social media, spam
46Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. Search on Bibsonomy HCI (16) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks
46Anjali Sardana, Ramesh Chandra Joshi Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Cláudia J. Barenco Abbas, L. Javier García-Villalba, Victoria López López Implementation and Attacks Analysis of a Honeypot. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Robert McGrew 0002, Rayford B. Vaughn Experiences with Honeypot Systems: Development, Deployment, and Analysis. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Pei-Te Chen, Chi-Sung Laih, Fabien Pouget, Marc Dacier Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. Search on Bibsonomy SADFE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel 0001 Self Adaptive High Interaction Honeypots Driven by Game Theory. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
44Narisa Zhao, Xianfeng Zhang The Worm Propagation Model and Control Strategy Based on Distributed Honeynet. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Vinoo Thomas, Nitin Jyoti Bot countermeasures. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Vukasin Pejovic, Ivana Kovacevic, Slobodan Bojanic, Corado Leita, Jelena Popovic, Octavio Nieto-Taladriz Migrating a HoneyDepot to Hardware. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Xinwen Fu, Wei Yu 0002, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham On Recognizing Virtual Honeypots and Countermeasures. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Van-Hau Pham, Marc Dacier Honeypot Traces Forensics: The Observation Viewpoint Matters. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack trace analysis, botnet detection, honeypot
35Sourour Meharouech, Adel Bouhoula, Tarek Abbes Collaboration between Security Devices toward improving Network Defense. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collaboration between Security Devices, vulnerability scanner, Network Security, Firewall, Honeypot, IPS
35Jostein Jensen A Novel Testbed for Detection of Malicious Software Functionality. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF testbed, malware, honeypot, behavioural analysis
35Shih-Yao Dai, Sy-Yen Kuo MAPMon: A Host-Based Malware Detection Tool. Search on Bibsonomy PRDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Auto-Start Extensibility Point, Malware Attacking Points, Honeypot, Malicious Software, Backdoor
35Michael Vrable, Justin Ma, Jay Chen, David Moore 0001, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage Scalability, fidelity, and containment in the potemkin virtual honeyfarm. Search on Bibsonomy SOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF honeyfarm, malware, honeypot, virtual machine monitor, copy-on-write
34A. Umamaheswari, B. Kalaavathi Honeypot TB-IDS: trace back model based intrusion detection system using knowledge based honeypot construction model. Search on Bibsonomy Clust. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
34Cristian Pascariu, Ionut-Daniel Barbu Ransomware Honeypot: Honeypot solution designed to detect a ransomware infection identify the ransomware family. Search on Bibsonomy ECAI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
34Denis Lavrov, Veronique Blanchet, Shaoning Pang, Muyang He, Abdolhossein Sarrafzadeh COR-Honeypot: Copy-On-Risk, Virtual Machine as Honeypot in the Cloud. Search on Bibsonomy CLOUD The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
32Xiaoyan Sun, Yang Wang, Jie Ren, Yuefei Zhu, Shengli Liu 0003 Collecting Internet Malware Based on Client-side Honeypot. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier Automating the Analysis of Honeypot Data (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Internet threats analysis, malicious behavior characterization, Honeypots
32Mohamed Nassar 0001, Radu State, Olivier Festor VoIP Honeypot Architecture. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Anjali Sardana, Krishan Kumar 0001, Ramesh Chandra Joshi Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Anjali Sardana, Ramesh Chandra Joshi Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb Lessons learned from the deployment of a high-interaction honeypot. Search on Bibsonomy EDCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Neil C. Rowe Measuring the Effectiveness of Honeypot Counter-Counterdeception. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky Honeypot Forensics, Part II: Analyzing the Compromised Host. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network analysis, honeypots, honeynets
29Yu Adachi, Yoshihiro Oyama Malware analysis system using process-level virtualization. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Martin Gilje Jaatun, Åsmund Ahlmann Nyre, Jan Tore Sørensen Survival by Deception. Search on Bibsonomy SAFECOMP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Iyatiti Mokube, Michele Adams Honeypots: concepts, approaches, and challenges. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF types of honeypots, honeypots, legal issues
29Simon P. Chung, Aloysius K. Mok Collaborative Intrusion Prevention. Search on Bibsonomy WETICE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Mengjun Xie, Zhenyu Wu, Haining Wang HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Theodor Richardson Preventing Attacks on Back-End Servers using Masquerading/Honeypots. Search on Bibsonomy SNPD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Corrado Leita, Ken Mermoud, Marc Dacier ScriptGen: an automated script generation tool for honeyd. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Lance Spitzner Honeypots: Catching the Insider Threat. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao Correlation Analysis between Spamming Botnets and Malware Infected Hosts. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF darknet, spam, malware, honeypot, botnet, correlation analysis
20Akihiro Shimoda, Tatsuya Mori, Shigeki Goto Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. Search on Bibsonomy SAINT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF low-interaction, unused IP address, malware, honeypot
20Julia Narvaez, Chiraag Uday Aval, Barbara Endicott-Popovsky, Christian Seifert, Ashish Malviya, Doug Nordwall Assessment of Virtualization as a Sensor Technique. Search on Bibsonomy SADFE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF virtualization detection, virtual machine, virtualization, malware, honeypot, cyber-security, malware analysis
20Christian Seifert, Peter Komisarczuk, Ian Welch True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF client honeypot, security, evaluation, intrusion detection
20Seiichiro Mizoguchi, Yoshiaki Hori, Kouichi Sakurai Monitoring Unused IP Addresses on Segments Managed by DHCP. Search on Bibsonomy NCM (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, network monitoring, honeypot, DHCP
20Junfeng Tian, Ning Li A New Proactive Defense Model Based on Intrusion Deception and Traceback. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion deception, Trap environment, Honeypot, Traceback
20M. Shirantha de Silva, David J. Parish, Peter Sandford, Jonathan M. Sandford Automated Detection of Emerging Network Security Threats. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Honey Net, Network Security, Network Management, Network Monitoring, Honeypot, System Security
20Kurniadi Asrigo, Lionel Litty, David Lie Using VMM-based sensors to monitor honeypots. Search on Bibsonomy VEE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF honeypot monitoring, intrusion detection, IDS, virtual machine monitor
20George Chamales The Honeywall CD-ROM. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF honeywall, blackhat, honeypot, hackers, honeynet
20John G. Levine, Julian B. Grizzard, Henry L. Owen Using Honeynets to Protect Large Enterprise Networks. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF firewall, honeypot, honeynet
20Jeremiah K. Jones, Gordon W. Romney Honeynets: an educational resource for IT security. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IT educational resource, information technology, honeypot, information assurance, curricula, honeynet, security education
20Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson Characteristics of internet background radiation. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF internet background radiation, network telescope, honeypot
20Bill McCarty Botnets: Big and Bigger. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF honeypot, botnet, honeynet
17Fatna El Mendili, Mohammed Fattah, Nisrine Berros, Youness Filaly, Younès El Bouzekri El Idrissi Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Hironori Uchibori, Katsunari Yoshioka, Kazumasa Omote Honeypot Method to Lure Attackers Without Holding Crypto-Assets. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Takayuki Sasaki, Mami Kawaguchi, Takuhiro Kumagai, Katsunari Yoshioka, Tsutomu Matsumoto Observation of Human-Operated Accesses Using Remote Management Device Honeypot. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Jianguo Ren, Qiang Zhi An Efficient Multiplex Network Model for Effective Honeypot Roaming Against DDoS Attacks. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Martin Gubri, Dennis Ulmer, Hwaran Lee, Sangdoo Yun, Seong Joon Oh TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Wenjun Fan, Zhihui Du, Max Smith-Creasey, David Fernández 0002 HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17H. K. Sampada, K. R. Shobha Cluster-based multiple malicious node detection using honeypot-AODV in MANETs. Search on Bibsonomy Int. J. Commun. Networks Distributed Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Yuntao Wang 0004, Zhou Su, Abderrahim Benslimane, Qichao Xu, Minghui Dai, Ruidong Li Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Weixiang Ding A GAN-based security strategy for WSN networks based on honeypot algorithm. Search on Bibsonomy Phys. Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Irini Lygerou, Shreyas Srinivasa, Emmanouil Vasilomanolakis, George Stergiopoulos, Dimitris Gritzalis Correction to: A decentralized honeypot for IoT Protocols based on Android devices. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Xingyuan Yang, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang, Jinyu Zhao A Highly Interactive Honeypot-Based Approach to Network Threat Management. Search on Bibsonomy Future Internet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Yao Shan, Yu Yao, Tong Zhao, Wei Yang NeuPot: A Neural Network-Based Honeypot for Detecting Cyber Threats in Industrial Control Systems. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Avijit Mondal, Radha Tamal Goswami Ad-hoc networks: new detection and prevention approach to malicious attacks using Honeypot. Search on Bibsonomy Int. J. Cloud Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Sibi Chakkaravarthy Sethuraman, Tharshith Goud Jadapalli, Devi Priya Vimala Sudhakaran, Saraju P. Mohanty Flow based containerized honeypot approach for network traffic analysis: An empirical study. Search on Bibsonomy Comput. Sci. Rev. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Sai Chaithanya Movva, Suresh Nikudiya, Varsha S. Basanaik, Damodar Reddy Edla, Hanumanthu Bhukya Intelligent IDS: Venus Fly-Trap Optimization with Honeypot Approach for Intrusion Detection and Prevention. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Michaela Brunner, Hye-Hyun Lee, Alexander Hepp, Johanna Baehr, Georg Sigl Hardware Honeypot: Setting Sequential Reverse Engineering on a Wrong Track. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Rundong Gan, Le Wang, Xiaodong Lin 0001 Why Trick Me: The Honeypot Traps on Decentralized Exchanges. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Chongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu, Thomas La Porta HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Yagmur Yigit, Omer Kemal Kinaci, Trung Q. Duong, Berk Canberk TwinPot: Digital Twin-assisted Honeypot for Cyber-Secure Smart Seaports. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Massimiliano Baldo, Tommaso Bianchi, Mauro Conti, Alessio Trevisan, Federico Turrin HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Stefan Machmeier Honeypot Implementation in a Cloud Environment. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Volviane Saphir Mfogo, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 541 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license