|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 47 occurrences of 22 keywords
|
|
|
Results
Found 58 publication records. Showing 58 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
149 | Jeremiah K. Jones, Gordon W. Romney |
Honeynets: an educational resource for IT security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 24-28, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
IT educational resource, information technology, honeypot, information assurance, curricula, honeynet, security education |
112 | Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, pp. 756-767, 2005, Springer, 3-540-25809-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Security, Honeypots, Forensics, Honeynets |
92 | Shiva Azadegan, Vanessa McKenna |
Use of Honeynets in Computer Security Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 14-16 July 2005, Jeju Island, South Korea, pp. 320-325, 2005, IEEE Computer Society, 0-7695-2296-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Computer Security, Honeypots, Honeynets, Security Education |
69 | Lance Spitzner |
The Honeynet Project: Trapping the Hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(2), pp. 15-23, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Honeynet Project, early warning and prediction, distributed honeynets, Honeypots, information gathering, honeynets |
68 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
Using Honeynets to Protect Large Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(6), pp. 73-75, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
firewall, honeypot, honeynet |
65 | Bill McCarty |
The Honeynet Arms Race. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(6), pp. 79-82, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
data-capture tools, honeynets, data capture |
48 | Bill McCarty |
Automated Identity Theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(5), pp. 89-92, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC |
47 | Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford |
An Attacker-Defender Game for Honeynets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COCOON ![In: Computing and Combinatorics, 15th Annual International Conference, COCOON 2009, Niagara Falls, NY, USA, July 13-15, 2009, Proceedings, pp. 7-16, 2009, Springer, 978-3-642-02881-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Robin E. Bloomfield, Ilir Gashi, Andrey Povyakalo, Vladimir Stankovic 0002 |
Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 11-14 November 2008, Seattle/Redmond, WA, USA, pp. 219-228, 2008, IEEE Computer Society, 978-0-7695-3405-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 1-12, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Michael O'Leary, Shiva Azadegan, Jay Lakhani |
Development of a Honeynet Laboratory: a Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Seventh International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2006), 19-20 June 2006, Las Vegas, Nevada, USA, pp. 401-406, 2006, IEEE Computer Society, 0-7695-2611-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
computer security, Honeynets, security education |
27 | Jason M. Pittman, Shaho Alaee |
To What Extent Are Honeypots and Honeynets Autonomic Computing Systems? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.11038, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Amir Javadpour, Forough Ja'fari, Tarik Taleb, Chafika Benzaïd |
A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 27th International Conference on Engineering of Complex Computer Systems, ICECCS 2023, Toulouse, France, June 14-16, 2023, pp. 81-88, 2023, IEEE, 979-8-3503-4004-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Eric M. Toth, Md Minhaz Chowdhury |
Honeynets and Cloud Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIIoT ![In: 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, June 6-9, 2022, pp. 270-275, 2022, IEEE, 978-1-6654-8453-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac |
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Surv. Tutorials ![In: IEEE Commun. Surv. Tutorials 23(4), pp. 2351-2383, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac |
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2108.02287, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
27 | Alejandro Molina Zarca, Jorge Bernal Bernabé, Antonio F. Skarmeta, José M. Alcaraz Calero |
Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 38(6), pp. 1262-1277, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Chuan Sheng, Yu Yao, Dongbiao Li, Hongna An, Wei Yang |
Honeyeye: A Network Traffic Collection Framework for Distributed ICS Honeynets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA/BDCloud/SocialCom/SustainCom ![In: IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking, ISPA/BDCloud/SocialCom/SustainCom 2020, Exeter, United Kingdom, December 17-19, 2020, pp. 466-473, 2020, IEEE, 978-1-6654-1485-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Christos Dalamagkas, Panagiotis G. Sarigiannidis, Dimosthenis Ioannidis, Eider Iturbe, Odysseas Nikolis, Francisco Ramos 0003, Erkuden Rios, Antonios Sarigiannidis, Dimitrios Tzovaras |
A Survey On Honeypots, Honeynets And Their Applications On Smart Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetSoft ![In: 5th IEEE Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019, pp. 93-100, 2019, IEEE, 978-1-5386-9376-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Xing Ling, Yeonwoo Rho, Chee-Wooi Ten |
Predicting Global Trend of Cybersecurity on Continental Honeynets Using Vector Autoregression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISGT Europe ![In: 2019 IEEE PES Innovative Smart Grid Technologies Europe, ISGT-Europe 2019, Bucharest, Romania, September 29 - October 2, 2019, pp. 1-5, 2019, IEEE, 978-1-5386-8218-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Pavol Sokol, Jakub Mísek, Martin Husák |
Honeypots and honeynets: issues of privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Inf. Secur. ![In: EURASIP J. Inf. Secur. 2017, pp. 4, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Markus Gruber, Dirk Hoffstadt, Adnan Aziz, Florian Fankhauser, Christian Schanes, Erwin P. Rathgeb, Thomas Grechenig |
Global VoIP security threats - large scale validation based on independent honeynets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: Proceedings of the 14th IFIP Networking Conference, Networking 2015, Toulouse, France, 20-22 May, 2015, pp. 1-9, 2015, IEEE Computer Society, 978-3-901882-68-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Pavol Sokol, Maros Andrejko |
Deploying Honeypots and Honeynets: Issues of Liability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CN ![In: Computer Networks - 22nd International Conference, CN 2015, Brunów, Poland, June 16-19, 2015. Proceedings, pp. 92-101, 2015, Springer, 978-3-319-19418-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Tomas Sochor, Matej Zuzcak |
Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CN ![In: Computer Networks - 22nd International Conference, CN 2015, Brunów, Poland, June 16-19, 2015. Proceedings, pp. 69-81, 2015, Springer, 978-3-319-19418-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Pavol Sokol, Martin Husák, Frantiek Liptak |
Deploying Honeypots and Honeynets: Issue of Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: 10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015, pp. 397-403, 2015, IEEE Computer Society, 978-1-4673-6590-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Pavol Sokol, Lenka Kleinova, Martin Husák |
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCON ![In: IEEE EUROCON 2015 - International Conference on Computer as a Tool, Salamanca, Spain, September 8-11, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-8569-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Napoleon Paxton, Dae-il Jang, Stephen Russell 0001, Gail-Joon Ahn, Ira S. Moskowitz, Paul Hyden |
Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 48th Hawaii International Conference on System Sciences, HICSS 2015, Kauai, Hawaii, USA, January 5-8, 2015, pp. 5244-5252, 2015, IEEE Computer Society, 978-1-4799-7367-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Fahim H. Abbasi, Richard J. Harris 0001, Stephen Marsland, Giovanni S. Moretti |
An exemplar-based learning approach for detection and classification of malicious network streams in honeynets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 7(2), pp. 352-364, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Peter Pisarcík, Pavol Sokol |
Framework for distributed virtual honeynets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 324, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Tomas Sochor, Matej Zuzcak |
Study of Internet Threats and Attack Methods Using Honeypots and Honeynets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CN ![In: Computer Networks - 21st International Conference, CN 2014, Brunów, Poland, June 23-27, 2014. Proceedings, pp. 118-127, 2014, Springer, 978-3-319-07940-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Mohammed H. Sqalli, Syed Naeem Firdous, Khaled Salah 0001, Marwan H. Abu-Amara |
Classifying malicious activities in Honeynets using entropy and volume-based thresholds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 6(5), pp. 567-583, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias |
Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings, pp. 164-177, 2013, Springer, 978-3-642-38630-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Manuel Gil Pérez, Verónica Mateos Lanchas, David Fernández Cambronero, Gregorio Martínez Pérez, Víctor A. Villagrá |
RECLAMO: Virtual and Collaborative Honeynets Based on Trust Management and Autonomous Systems Applied to Intrusion Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: Seventh International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2013, Taichung, Taiwan, July 3-5, 2013, pp. 219-227, 2013, IEEE Computer Society, 978-0-7695-4992-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Fahim H. Abbasi, Richard J. Harris 0001, Giovanni S. Moretti, Aun Haider, Nafees Anwar |
Classification of malicious network streams using honeynets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: 2012 IEEE Global Communications Conference, GLOBECOM 2012, Anaheim, CA, USA, December 3-7, 2012, pp. 891-897, 2012, IEEE, 978-1-4673-0920-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Anton Chuvakin |
Honeypots and Honeynets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Jordi Herrera-Joancomartí, Cristina Pérez-Solà |
Online Social Honeynets: Trapping Web Crawlers in OSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDAI ![In: Modeling Decision for Artificial Intelligence - 8th International Conference, MDAI 2011, Changsha, Hunan, China, July 28-30, 2011, Proceedings, pp. 1-16, 2011, Springer, 978-3-642-22588-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Paul Barford, Yan Chen 0004, Anup Goyal, Zhichun Li, Vern Paxson, Vinod Yegneswaran |
Employing Honeynets For Network Situational Awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Situational Awareness ![In: Cyber Situational Awareness - Issues and Research, pp. 71-102, 2010, Springer, 978-1-4419-0139-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Christopher Hecker, Brian Hay |
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI, USA, pp. 1-10, 2010, IEEE Computer Society, 978-0-7695-3869-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Cristine Hoepers |
Design and implementation of an infrastructure for honeypots and honeynets' information exchange and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2008 |
RDF |
|
27 | Christos K. Dimitriadis |
Improving Mobile Core Network Security with Honeynets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(4), pp. 40-47, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Richard A. Wasniowski |
Using Honeynets and Alerts Correlation for Intrusion Detection and Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2007 International Conference on Security & Management, SAM 2007, Las Vegas, Nevada, USA, June 25-28, 2007, pp. 542-545, 2007, CSREA Press, 1-60132-048-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
27 | Christos K. Dimitriadis |
Honeynets in 3G - A Game Theoretic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 146-152, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
27 | Maximillian Dornseif, Sascha May |
Modelling the costs and benefits of Honeynets ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR cs.CR/0406057, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
27 | Maximillian Dornseif, Thorsten Holz, Christian N. Klein |
NoSEBrEaK - Attacking Honeynets ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR cs.CR/0406052, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
27 | Richard Stevens, Hartmut Pohl |
Honeypots und Honeynets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Spektrum ![In: Inform. Spektrum 27(3), pp. 260-264, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver |
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 92-99, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
24 | John R. Lange, Peter A. Dinda, Fabián E. Bustamante |
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 317-336, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
volunteer systems, honeypots, honeynets, wormholes |
24 | Mark Ryan del Moral Talabis |
Honeynet learning: discovering IT security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGCSE Bull. ![In: ACM SIGCSE Bull. 38(2), pp. 110-114, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IT education, problem-based learning, Honeynets, IT security |
24 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics Part I: Analyzing the Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(4), pp. 72-78, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
blackhat, honeypots, honeynets |
24 | Neal Krawetz |
Anti-Honeypot Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(1), pp. 76-79, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
spam, honeypots, honeynets, trackers |
24 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics, Part II: Analyzing the Compromised Host. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(5), pp. 77-80, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
network analysis, honeypots, honeynets |
20 | Robin Berthier, Dave Kormann, Michel Cukier, Matti A. Hiltunen, Gregg Vesonder, Daniel Sheleheda |
On the Comparison of Network Attack Datasets: An Empirical Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, Nanjing, China, December 3 - 5, 2008, pp. 39-48, 2008, IEEE Computer Society, 978-0-7695-3482-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Leonard Kwan, Pradeep Ray, Greg Stephens |
Towards a Methodology for Profiling Cyber Criminals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 264, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Zhichun Li, Lanjia Wang, Yan Chen 0004, Zhi Fu |
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the IEEE International Conference on Network Protocols, ICNP 2007, October 16-19, 2007, Beijing, China, pp. 164-173, 2007, IEEE Computer Society, 1-4244-1588-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Hao Tu, Zhitang Li, Bin Liu 0013 |
Detecting Botnets by Analyzing DNS Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 323-324, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, Raghu Ramakrishnan 0001 |
Toward a Query Language for Network Attack Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 22nd International Conference on Data Engineering Workshops, ICDE 2006, 3-7 April 2006, Atlanta, GA, USA, pp. 28, 2006, IEEE Computer Society, 0-7695-2571-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | W. Timothy Strayer, Robert Walsh, Carl Livadas, David E. Lapsley |
Detecting Botnets with Tight Command and Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2006, The 31st Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, 14-16 November 2006, pp. 195-202, 2006, IEEE Computer Society, 1-4244-0418-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | George Chamales |
The Honeywall CD-ROM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(2), pp. 77-79, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
honeywall, blackhat, honeypot, hackers, honeynet |
Displaying result #1 - #58 of 58 (100 per page; Change: )
|
|