The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for honeynets with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2005 (16) 2006-2009 (15) 2010-2015 (17) 2017-2023 (10)
Publication types (Num. hits)
article(20) incollection(2) inproceedings(35) phdthesis(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 47 occurrences of 22 keywords

Results
Found 58 publication records. Showing 58 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
149Jeremiah K. Jones, Gordon W. Romney Honeynets: an educational resource for IT security. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IT educational resource, information technology, honeypot, information assurance, curricula, honeynet, security education
112Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security, Honeypots, Forensics, Honeynets
92Shiva Azadegan, Vanessa McKenna Use of Honeynets in Computer Security Education. Search on Bibsonomy ACIS-ICIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Computer Security, Honeypots, Honeynets, Security Education
69Lance Spitzner The Honeynet Project: Trapping the Hackers. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Honeynet Project, early warning and prediction, distributed honeynets, Honeypots, information gathering, honeynets
68John G. Levine, Julian B. Grizzard, Henry L. Owen Using Honeynets to Protect Large Enterprise Networks. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF firewall, honeypot, honeynet
65Bill McCarty The Honeynet Arms Race. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF data-capture tools, honeynets, data capture
48Bill McCarty Automated Identity Theft. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC
47Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford An Attacker-Defender Game for Honeynets. Search on Bibsonomy COCOON The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Robin E. Bloomfield, Ilir Gashi, Andrey Povyakalo, Vladimir Stankovic 0002 Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network. Search on Bibsonomy ISSRE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann Risk Assessment of Production Networks Using Honeynets - Some Practical Experience. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Michael O'Leary, Shiva Azadegan, Jay Lakhani Development of a Honeynet Laboratory: a Case Study. Search on Bibsonomy SNPD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computer security, Honeynets, security education
27Jason M. Pittman, Shaho Alaee To What Extent Are Honeypots and Honeynets Autonomic Computing Systems? Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Amir Javadpour, Forough Ja'fari, Tarik Taleb, Chafika Benzaïd A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques. Search on Bibsonomy ICECCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Eric M. Toth, Md Minhaz Chowdhury Honeynets and Cloud Security. Search on Bibsonomy AIIoT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. Search on Bibsonomy IEEE Commun. Surv. Tutorials The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
27Alejandro Molina Zarca, Jorge Bernal Bernabé, Antonio F. Skarmeta, José M. Alcaraz Calero Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Chuan Sheng, Yu Yao, Dongbiao Li, Hongna An, Wei Yang Honeyeye: A Network Traffic Collection Framework for Distributed ICS Honeynets. Search on Bibsonomy ISPA/BDCloud/SocialCom/SustainCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Christos Dalamagkas, Panagiotis G. Sarigiannidis, Dimosthenis Ioannidis, Eider Iturbe, Odysseas Nikolis, Francisco Ramos 0003, Erkuden Rios, Antonios Sarigiannidis, Dimitrios Tzovaras A Survey On Honeypots, Honeynets And Their Applications On Smart Grid. Search on Bibsonomy NetSoft The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Xing Ling, Yeonwoo Rho, Chee-Wooi Ten Predicting Global Trend of Cybersecurity on Continental Honeynets Using Vector Autoregression. Search on Bibsonomy ISGT Europe The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Pavol Sokol, Jakub Mísek, Martin Husák Honeypots and honeynets: issues of privacy. Search on Bibsonomy EURASIP J. Inf. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Markus Gruber, Dirk Hoffstadt, Adnan Aziz, Florian Fankhauser, Christian Schanes, Erwin P. Rathgeb, Thomas Grechenig Global VoIP security threats - large scale validation based on independent honeynets. Search on Bibsonomy Networking The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Pavol Sokol, Maros Andrejko Deploying Honeypots and Honeynets: Issues of Liability. Search on Bibsonomy CN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Tomas Sochor, Matej Zuzcak Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection. Search on Bibsonomy CN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Pavol Sokol, Martin Husák, Frantiek Liptak Deploying Honeypots and Honeynets: Issue of Privacy. Search on Bibsonomy ARES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Pavol Sokol, Lenka Kleinova, Martin Husák Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. Search on Bibsonomy EUROCON The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Napoleon Paxton, Dae-il Jang, Stephen Russell 0001, Gail-Joon Ahn, Ira S. Moskowitz, Paul Hyden Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis. Search on Bibsonomy HICSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Fahim H. Abbasi, Richard J. Harris 0001, Stephen Marsland, Giovanni S. Moretti An exemplar-based learning approach for detection and classification of malicious network streams in honeynets. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Peter Pisarcík, Pavol Sokol Framework for distributed virtual honeynets. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Tomas Sochor, Matej Zuzcak Study of Internet Threats and Attack Methods Using Honeypots and Honeynets. Search on Bibsonomy CN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Mohammed H. Sqalli, Syed Naeem Firdous, Khaled Salah 0001, Marwan H. Abu-Amara Classifying malicious activities in Honeynets using entropy and volume-based thresholds. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Manuel Gil Pérez, Verónica Mateos Lanchas, David Fernández Cambronero, Gregorio Martínez Pérez, Víctor A. Villagrá RECLAMO: Virtual and Collaborative Honeynets Based on Trust Management and Autonomous Systems Applied to Intrusion Management. Search on Bibsonomy CISIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Fahim H. Abbasi, Richard J. Harris 0001, Giovanni S. Moretti, Aun Haider, Nafees Anwar Classification of malicious network streams using honeynets. Search on Bibsonomy GLOBECOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Anton Chuvakin Honeypots and Honeynets. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Jordi Herrera-Joancomartí, Cristina Pérez-Solà Online Social Honeynets: Trapping Web Crawlers in OSN. Search on Bibsonomy MDAI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Paul Barford, Yan Chen 0004, Anup Goyal, Zhichun Li, Vern Paxson, Vinod Yegneswaran Employing Honeynets For Network Situational Awareness. Search on Bibsonomy Cyber Situational Awareness The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Christopher Hecker, Brian Hay Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support. Search on Bibsonomy HICSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Cristine Hoepers Design and implementation of an infrastructure for honeypots and honeynets' information exchange and analysis. Search on Bibsonomy 2008   RDF
27Christos K. Dimitriadis Improving Mobile Core Network Security with Honeynets. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Richard A. Wasniowski Using Honeynets and Alerts Correlation for Intrusion Detection and Prevention. Search on Bibsonomy Security and Management The full citation details ... 2007 DBLP  BibTeX  RDF
27Christos K. Dimitriadis Honeynets in 3G - A Game Theoretic Analysis. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
27Maximillian Dornseif, Sascha May Modelling the costs and benefits of Honeynets Search on Bibsonomy CoRR The full citation details ... 2004 DBLP  BibTeX  RDF
27Maximillian Dornseif, Thorsten Holz, Christian N. Klein NoSEBrEaK - Attacking Honeynets Search on Bibsonomy CoRR The full citation details ... 2004 DBLP  BibTeX  RDF
27Richard Stevens, Hartmut Pohl Honeypots und Honeynets. Search on Bibsonomy Inform. Spektrum The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
24John R. Lange, Peter A. Dinda, Fabián E. Bustamante Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF volunteer systems, honeypots, honeynets, wormholes
24Mark Ryan del Moral Talabis Honeynet learning: discovering IT security. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IT education, problem-based learning, Honeynets, IT security
24Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky Honeypot Forensics Part I: Analyzing the Network. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF blackhat, honeypots, honeynets
24Neal Krawetz Anti-Honeypot Technology. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF spam, honeypots, honeynets, trackers
24Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky Honeypot Forensics, Part II: Analyzing the Compromised Host. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network analysis, honeypots, honeynets
20Robin Berthier, Dave Kormann, Michel Cukier, Matti A. Hiltunen, Gregg Vesonder, Daniel Sheleheda On the Comparison of Network Attack Datasets: An Empirical Analysis. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Leonard Kwan, Pradeep Ray, Greg Stephens Towards a Methodology for Profiling Cyber Criminals. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Zhichun Li, Lanjia Wang, Yan Chen 0004, Zhi Fu Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms. Search on Bibsonomy ICNP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Hao Tu, Zhitang Li, Bin Liu 0013 Detecting Botnets by Analyzing DNS Traffic. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, Raghu Ramakrishnan 0001 Toward a Query Language for Network Attack Data. Search on Bibsonomy ICDE Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20W. Timothy Strayer, Robert Walsh, Carl Livadas, David E. Lapsley Detecting Botnets with Tight Command and Control. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20George Chamales The Honeywall CD-ROM. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF honeywall, blackhat, honeypot, hackers, honeynet
Displaying result #1 - #58 of 58 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license