The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for honeynet with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2005 (21) 2006-2008 (15) 2009-2011 (19) 2012-2014 (16) 2015-2017 (19) 2018-2021 (19) 2022-2024 (9)
Publication types (Num. hits)
article(37) incollection(1) inproceedings(80)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 62 occurrences of 38 keywords

Results
Found 118 publication records. Showing 118 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
142Lance Spitzner The Honeynet Project: Trapping the Hackers. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Honeynet Project, early warning and prediction, distributed honeynets, Honeypots, information gathering, honeynets
116Kevin Curran, Colman Morrissey, Colm Fagan, Colm Murphy, Brian O'Donnell, Gerry Fitzpatrick, Stephen Condit Monitoring hacker activity with a Honeynet. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
112Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford An Attacker-Defender Game for Honeynets. Search on Bibsonomy COCOON The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
105Wei Ren 0002, Hai Jin 0001 Honeynet based distributed adaptive network forensics and active real time investigation. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network, network security, digital forensics, computer forensics, honeynet, network forensics
100George Chamales The Honeywall CD-ROM. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF honeywall, blackhat, honeypot, hackers, honeynet
93Chih-Hung Chang A Low-Cost Green IT Design and Application of VHSP Based on Virtualization Technology. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
79Narisa Zhao, Xianfeng Zhang The Worm Propagation Model and Control Strategy Based on Distributed Honeynet. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
63Zhichun Li, Anup Goyal, Yan Chen 0004, Vern Paxson Automating analysis of large-scale botnet probing events. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF global property extrapolation, scan strategy inference, situational awareness, botnet, statistical inference, honeynet
63Christopher P. Lee 0001, John A. Copeland Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers. Search on Bibsonomy VizSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network attack analysis, team collaboration, user interfaces, information visualization, tagging, folksonomy, parallel coordinates, honeynet
63Jeremiah K. Jones, Gordon W. Romney Honeynets: an educational resource for IT security. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IT educational resource, information technology, honeypot, information assurance, curricula, honeynet, security education
63Bill McCarty Botnets: Big and Bigger. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF honeypot, botnet, honeynet
60Mark Ryan del Moral Talabis Honeynet learning: discovering IT security. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IT education, problem-based learning, Honeynets, IT security
60Bill McCarty The Honeynet Arms Race. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF data-capture tools, honeynets, data capture
56Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security, Honeypots, Forensics, Honeynets
56Bill McCarty Automated Identity Theft. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC
49Mohammed H. Sqalli, Shoieb Arshad, Mohammad Khalaf, Khaled Salah 0001 Identifying Scanning Activities in Honeynet Data Using Data Mining. Search on Bibsonomy CICSyN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Data Mining, Intrusion Detection, Scanning, Honeynet
44John G. Levine, Julian B. Grizzard, Henry L. Owen Using Honeynets to Protect Large Enterprise Networks. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF firewall, honeypot, honeynet
42Birger Tödtmann, Stephan Riebach, Erwin P. Rathgeb The Honeynet Quarantine: Reducing Collateral Damage Caused by Early Intrusion Response. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Michael O'Leary, Shiva Azadegan, Jay Lakhani Development of a Honeynet Laboratory: a Case Study. Search on Bibsonomy SNPD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computer security, Honeynets, security education
37Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier Automating the Analysis of Honeypot Data (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Internet threats analysis, malicious behavior characterization, Honeypots
23Liang Zhao, Satoru Kobayashi, Kensuke Fukuda Exploring the Discovery Process of Fresh IPv6 Prefixes: An Analysis of Scanning Behavior in Darknet and Honeynet. Search on Bibsonomy PAM (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Marco Lucchese, Massimo Merro, Federica Paci, Nicola Zannone Towards A High-interaction Physics-aware Honeynet for Industrial Control Systems. Search on Bibsonomy SAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Marco Lucchese, Francesco Lupia, Massimo Merro, Federica Paci, Nicola Zannone, Angelo Furfaro HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems. Search on Bibsonomy ARES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Alexios Lekidis, George Daniil, Panagiotis Mavrommatis, Konstantinos Lampropoulos 0001, Odysseas G. Koufopavlou AMINet: An Industrial Honeynet for AMI Systems. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Navroop Kohli, Sanjeev Kumar, Rakesh Kumar Sehgal SDN-based Intelligent Honeynet Architecture for Averting Attacks. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Jeroen Pijpker, Stephen James McCombie A Ship Honeynet to Gather Cyber Threat Intelligence for the Maritime Sector. Search on Bibsonomy LCN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Kushnian Kour, Subhashish Goswami, Meenakshi Sharma, P. Thiruvannamalai SivaSankar, Vipul Vekariya, Alka Kumari Honeynet Implementation in Cyber Security Attack Prevention with Data Monitoring System Using AI Technique and IoT 4G Networks. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Liang Tan 0001, Keping Yu, Fangpeng Ming, Xiaofan Cheng, Gautam Srivastava 0001 Secure and Resilient Artificial Intelligence of Things: A HoneyNet Approach for Threat Detection and Situational Awareness. Search on Bibsonomy IEEE Consumer Electron. Mag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Xiaoyu Du, Guanying Zhou, Yujing Wang, Song Tao A Lightweight Honeynet Design In the Internet of Things. Search on Bibsonomy TrustCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Matej Zuzcák, Petr Bujok Using honeynet data and a time series to predict the number of cyber attacks. Search on Bibsonomy Comput. Sci. Inf. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Jianguo Ren, Chunming Zhang, Qihong Hao A theoretical method to evaluate honeynet potency. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Audrey Asante, Vincent Amankona Digital Forensic Readiness Framework based on Honeypot and Honeynet for BYOD. Search on Bibsonomy J. Digit. Forensics Secur. Law The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Chuan Sheng, Yu Yao, Qiang Fu 0005, Wei Yang, Ying Liu Study on the intelligent honeynet model for containing the spread of industrial viruses. Search on Bibsonomy Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Antonina Kashtalian, Tomas Sochor K-means Clustering of Honeynet Data with Unsupervised Representation Learning. Search on Bibsonomy IntelITSIS The full citation details ... 2021 DBLP  BibTeX  RDF
23Jing Tao, A. Chen, Kai Liu, Kailiang Chen, Fengyuan Li, Peng Fu Recommendation Method of Honeynet Trapping Component Based on LSTM. Search on Bibsonomy DASC/PiCom/CBDCom/CyberSciTech The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Paul Lackner How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey. Search on Bibsonomy ICEIS (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Qiang Fu 0005, Yu Yao, Chuan Sheng, Wei Yang Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Weizhe Zhang, Bin Zhang 0048, Ying Zhou, Hui He, Zeyu Ding 0003 An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Matej Zuzcák, Milan Zenka Expert system assessing threat level of attacks on a hybrid SSH honeynet. Search on Bibsonomy Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Jianguo Ren, Chunming Zhang A differential game method against attacks in heterogeneous honeynet. Search on Bibsonomy Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Tong Kong, Liming Wang, Duohe Ma, Zhen Xu 0009, Qian Yang, Zhitong Lu, Yijun Lu Automated Honeynet Deployment Strategy for Active Defense in Container-based Cloud. Search on Bibsonomy HPCC/DSS/SmartCity The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Desheng Zhang, Lei Chen Benefit Optimization of SDN Honeynet System Based on Mimic Defense. Search on Bibsonomy SimuTools (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Kanghua Cao, Weiwei Dong, Jinliang Wang, Lin Zhou, Yong Wang 基于虚拟蜜网的用电信息采集系统攻击检测方法 (Attack Detection Method for Electricity Information Collection System Based on Virtual Honeynet). Search on Bibsonomy 计算机科学 The full citation details ... 2019 DBLP  BibTeX  RDF
23Stamatia Triantopoulou, Dimitrios Papanikas, Panayiotis Kotzanikolaou An Experimental Analysis of Current DDoS attacks Based on a Provider Edge Router Honeynet. Search on Bibsonomy IISA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Zhiqiang Wang 0006, Gefei Li 0003, Yaping Chi, Jianyi Zhang, Qixu Liu, Tao Yang, Wei Zhou Honeynet Construction Based on Intrusion Detection. Search on Bibsonomy CSAE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Suman Bhunia, Edward Miles, Shamik Sengupta, Felisa J. Vázquez-Abad CR-Honeynet: A Cognitive Radio Learning and Decoy-Based Sustenance Mechanism to Avoid Intelligent Jammer. Search on Bibsonomy IEEE Trans. Cogn. Commun. Netw. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Bahman Rashidi, Carol J. Fung, Kevin W. Hamlen, Andrzej Kamisinski HoneyV: A virtualized honeynet system based on network softwarization. Search on Bibsonomy NOMS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Zakariya Ammar, Ahmad Alsharif Deployment of IoT-based honeynet model. Search on Bibsonomy ICIT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Wenjun Fan, David Fernández 0002, Zhihui Du Versatile virtual honeynet management framework. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Danny Velasco, Glen Dario Rodriguez Rafael A review of the current state of Honeynet architectures and tools. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Jinwoo Kim, Seungwon Shin Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks. Search on Bibsonomy DSN Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Sukwha Kyung, Wonkyu Han, Naveen Tiwari, Vaibhav Hemant Dixit, Lakshmi Srinivas, Ziming Zhao 0001, Adam Doupé, Gail-Joon Ahn HoneyProxy: Design and implementation of next-generation honeynet via SDN. Search on Bibsonomy CNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Xiangjun Meng, Zhifeng Zhao, Rongpeng Li, Honggang Zhang 0001 An intelligent honeynet architecture based on software defined security. Search on Bibsonomy WCSP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Daisuke Mashima, Binbin Chen 0001, Prageeth Gunathilaka, Edwin Lesmana Tjiong Towards a grid-wide, high-fidelity electrical substation honeynet. Search on Bibsonomy SmartGridComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Wonkyu Han, Ziming Zhao 0001, Adam Doupé, Gail-Joon Ahn HoneyMix: Toward SDN-based Intelligent Honeynet. Search on Bibsonomy SDN-NFV@CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Andres Manzano, José Naranjo, Ivan Bernal, David Mejia A prototype for a honeynet based on SDN. Search on Bibsonomy EATIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Amos O. Olagunju, Farouk Samu In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention. Search on Bibsonomy RIIT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Juha Nurmi, Joona Kannisto, Markku Vajaranta Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet. Search on Bibsonomy AsiaJCIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Suman Bhunia, Shamik Sengupta, Felisa J. Vázquez-Abad Performance analysis of CR-honeynet to prevent jamming attack through stochastic modeling. Search on Bibsonomy Pervasive Mob. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Neha Agrawal, Shashikala Tapaswi Wireless Rogue Access Point Detection Using Shadow Honeynet. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Wenjun Fan, David Fernández 0002, Víctor A. Villagrá Technology Independent Honeynet Description Language. Search on Bibsonomy MODELSWARD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23W. Owen Redwood, Joshua Lawrence, Mike Burmester A Symbolic Honeynet Framework for SCADA System Threat Intelligence. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Ling Xue, Wei Lu 0018 Profiling Behavior of Intruders on Enterprise Honeynet: Deployment and Analysis. Search on Bibsonomy CONF-IRM The full citation details ... 2015 DBLP  BibTeX  RDF
23Wenjun Fan, David Fernández 0002, Zhihui Du Adaptive and Flexible Virtual Honeynet. Search on Bibsonomy MSPN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Alexandru Vlad Serbanescu, Sebastian Obermeier 0001, Der-Yeuan Yu ICS Threat Analysis Using a Large-Scale Honeynet. Search on Bibsonomy ICS-CSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Alexandru Vlad Serbanescu, Sebastian Obermeier 0001, Der-Yeuan Yu A Scalable Honeynet Architecture for Industrial Control Systems. Search on Bibsonomy ICETE (Selected Papers) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Mark Stockman, Robert Heile, Anthony Rein An Open-Source Honeynet System to Study System Banner Message Effects on Hackers. Search on Bibsonomy RIIT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Boniface Kayode Alese, R. A. Akingbola, Folasade Mojisola Dahunsi, Olumide S. Adewale, T. J. Ogundele Improving deception in honeynet: Through data manipulation. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Pavol Sokol Legal issues of honeynet's generations. Search on Bibsonomy ECAI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Michael Haney, Mauricio Papa A framework for the design and deployment of a SCADA honeynet. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Suman Bhunia, Shamik Sengupta, Felisa J. Vázquez-Abad CR-Honeynet: A Learning & Decoy Based Sustenance Mechanism against Jamming Attack in CRN. Search on Bibsonomy MILCOM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Frank Yeong-Sung Lin, Yu-Shun Wang, Ming-Yang Huang Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet. Search on Bibsonomy J. Appl. Math. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Dirk Hoffstadt, Niels Wolff, Stefan Monhof, Erwin P. Rathgeb Improved detection and correlation of multi-stage VoIP attack patterns by using a Dynamic Honeynet System. Search on Bibsonomy ICC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Markus Gruber, Christian Schanes, Florian Fankhauser, Martin Moutran, Thomas Grechenig Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Christopher Hecker, Brian Hay Automated Honeynet Deployment for Dynamic Network Environment. Search on Bibsonomy HICSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Markus Gruber, Christian Schanes, Florian Fankhauser, Thomas Grechenig Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynet. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Iksu Kim, Myungho Kim Agent-based honeynet framework for protecting servers in campus networks. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Álvaro Herrero 0001, Urko Zurutuza, Emilio Corchado A Neural-Visualization IDS for Honeynet Data. Search on Bibsonomy Int. J. Neural Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Haifeng Wang, Qingkui Chen Dynamic Deploying Distributed Low-interaction Honeynet. Search on Bibsonomy J. Comput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Yi-Lang Tsai, Bo-Yi Lee, Jee-Gong Chang Automated Malware Analysis Framework with Honeynet Technology in Taiwan Campuses. Search on Bibsonomy ICPADS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Dongwoo Kwon, James Won-Ki Hong, Hong-Taek Ju DDoS attack forecasting system architecture using Honeynet. Search on Bibsonomy APNOMS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Dirk Hoffstadt, Alexander Marold, Erwin P. Rathgeb Analysis of SIP-Based Threats Using a VoIP Honeynet System. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Yosra Ben Mustapha, Hervé Debar, Grégoire Jacob Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford Honeynet games: a game theoretic approach to defending network monitors. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Tian-Hua Liu, Xiu-shuang Yi, Shi-Wei Ma Core Functions Analysis and Example Deployment of Virtual Honeynet. Search on Bibsonomy RVSP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Markus Gruber, Florian Fankhauser, Stefan Taber, Christian Schanes, Thomas Grechenig Trapping and analyzing malicious VoIP traffic using a honeynet approach. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
23Markus Gruber, Florian Fankhauser, Stefan Taber, Christian Schanes, Thomas Grechenig Security Status of VoIP Based on the Observation of Real-World Attacks on a Honeynet. Search on Bibsonomy SocialCom/PASSAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Mohammed H. Sqalli, Syed Naeem Firdous, Khaled Salah 0001, Marwan H. Abu-Amara Identifying network traffic features suitable for honeynet data analysis. Search on Bibsonomy CCECE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Urko Zurutuza, Enaitz Ezpeleta, Álvaro Herrero 0001, Emilio Corchado Visualization of Misuse-Based Intrusion Detection: Application to Honeynet Data. Search on Bibsonomy SOCO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Mohammed H. Sqalli, Syed Naeem Firdous, Zubair A. Baig, Farag Azzedin An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic. Search on Bibsonomy CW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Frank Yeong-Sung Lin, Yu-Shun Wang, Po-Hao Tsang Efficient defense strategies to minimize attackers' success probabilities in honeynet. Search on Bibsonomy IAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Mohammed H. Sqalli, Raed Al-Shaikh, Ezzat Ahmed Towards Simulating a Virtual Distributed Honeynet at KFUPM: A Case Study. Search on Bibsonomy EMS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Michal Szczepanik, Ireneusz J. Jozwiak Detecting Malwares in Honeynet Using a Multi-agent System. Search on Bibsonomy NDT (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Haifeng Wang, Qingkui Chen Design of cooperative deployment in distributed Honeynet system. Search on Bibsonomy CSCWD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Mohammed H. Sqalli, Raed Al-Shaikh, Ezzat Ahmed A Distributed Honeynet at KFUPM: A Case Study. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Michal Szczepanik, Ireneusz J. Józwiak Detecting New and Unknown Malwares Using Honeynet. Search on Bibsonomy MISSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Izzeldin Amin Polymorphic Worm Detection Using Double-Honeynet. Search on Bibsonomy ICSEA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Jan Kohlrausch Experiences with the NoAH Honeynet Testbed to Detect new Internet Worms. Search on Bibsonomy IMF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Olivier Thonnard, Marc Dacier A framework for attack patterns' discovery in honeynet data. Search on Bibsonomy Digit. Investig. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Zhichun Li, Anup Goyal, Yan Chen 0004 Honeynet-based Botnet Scan Traffic Analysis. Search on Bibsonomy Botnet Detection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 118 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license