The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for blackhat with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2021 (12)
Publication types (Num. hits)
article(6) inproceedings(6)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7 occurrences of 4 keywords

Results
Found 12 publication records. Showing 12 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
55Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky Honeypot Forensics Part I: Analyzing the Network. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF blackhat, honeypots, honeynets
40Hao Yang, Kun Du, Yubao Zhang, Shuai Hao 0001, Haining Wang, Jia Zhang 0004, Haixin Duan Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO. Search on Bibsonomy ESORICS (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
40Kun Du, Hao Yang, Zhou Li 0001, Hai-Xin Duan, Kehuan Zhang The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2016 DBLP  BibTeX  RDF
40Suen Yek Blackhat fingerprinting of the wired and wireless honeynet. Search on Bibsonomy Australian Computer, Network & Information Forensics Conference The full citation details ... 2005 DBLP  BibTeX  RDF
31Eric Rescorla Is Finding Security Holes a Good Idea? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF blackhat, whitehat, software patches, vulnerability disclosure
31George Chamales The Honeywall CD-ROM. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF honeywall, blackhat, honeypot, hackers, honeynet
24Linda Wilbanks When Black Hats Are Really White. Search on Bibsonomy IT Prof. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra SilentKnock: Practical, Provably Undetectable Authentication. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Fernando C. Colón Osorio, Zachi Klopman And you though you were safe after SLAMMER, not so, swarms not Zombies present the greatest risk to our national Internet infrastructure. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Kevin Curran, Colman Morrissey, Colm Fagan, Colm Murphy, Brian O'Donnell, Gerry Fitzpatrick, Stephen Condit Monitoring hacker activity with a Honeynet. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Iyad Kuwatly, Malek Sraj, Zaid Al Masri, Hassan Artail A Dynamic Honeypot Design for Intrusion Detection. Search on Bibsonomy ICPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Bill McCarty The Honeynet Arms Race. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF data-capture tools, honeynets, data capture
Displaying result #1 - #12 of 12 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license