|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 47 occurrences of 22 keywords
|
|
|
Results
Found 58 publication records. Showing 58 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
149 | Jeremiah K. Jones, Gordon W. Romney |
Honeynets: an educational resource for IT security.  |
SIGITE Conference  |
2004 |
DBLP DOI BibTeX RDF |
IT educational resource, information technology, honeypot, information assurance, curricula, honeynet, security education |
112 | Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet.  |
NETWORKING  |
2005 |
DBLP DOI BibTeX RDF |
Security, Honeypots, Forensics, Honeynets |
92 | Shiva Azadegan, Vanessa McKenna |
Use of Honeynets in Computer Security Education.  |
ACIS-ICIS  |
2005 |
DBLP DOI BibTeX RDF |
Computer Security, Honeypots, Honeynets, Security Education |
69 | Lance Spitzner |
The Honeynet Project: Trapping the Hackers.  |
IEEE Secur. Priv.  |
2003 |
DBLP DOI BibTeX RDF |
Honeynet Project, early warning and prediction, distributed honeynets, Honeypots, information gathering, honeynets |
68 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
Using Honeynets to Protect Large Enterprise Networks.  |
IEEE Secur. Priv.  |
2004 |
DBLP DOI BibTeX RDF |
firewall, honeypot, honeynet |
65 | Bill McCarty |
The Honeynet Arms Race.  |
IEEE Secur. Priv.  |
2003 |
DBLP DOI BibTeX RDF |
data-capture tools, honeynets, data capture |
48 | Bill McCarty |
Automated Identity Theft.  |
IEEE Secur. Priv.  |
2003 |
DBLP DOI BibTeX RDF |
Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC |
47 | Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford |
An Attacker-Defender Game for Honeynets.  |
COCOON  |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Robin E. Bloomfield, Ilir Gashi, Andrey Povyakalo, Vladimir Stankovic 0002 |
Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network.  |
ISSRE  |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience.  |
ISPEC  |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Michael O'Leary, Shiva Azadegan, Jay Lakhani |
Development of a Honeynet Laboratory: a Case Study.  |
SNPD  |
2006 |
DBLP DOI BibTeX RDF |
computer security, Honeynets, security education |
27 | Jason M. Pittman, Shaho Alaee |
To What Extent Are Honeypots and Honeynets Autonomic Computing Systems?  |
CoRR  |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Amir Javadpour, Forough Ja'fari, Tarik Taleb, Chafika Benzaïd |
A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques.  |
ICECCS  |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Eric M. Toth, Md Minhaz Chowdhury |
Honeynets and Cloud Security.  |
AIIoT  |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac |
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems.  |
IEEE Commun. Surv. Tutorials  |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac |
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems.  |
CoRR  |
2021 |
DBLP BibTeX RDF |
|
27 | Alejandro Molina Zarca, Jorge Bernal Bernabé, Antonio F. Skarmeta, José M. Alcaraz Calero |
Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks.  |
IEEE J. Sel. Areas Commun.  |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Chuan Sheng, Yu Yao, Dongbiao Li, Hongna An, Wei Yang |
Honeyeye: A Network Traffic Collection Framework for Distributed ICS Honeynets.  |
ISPA/BDCloud/SocialCom/SustainCom  |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Christos Dalamagkas, Panagiotis G. Sarigiannidis, Dimosthenis Ioannidis, Eider Iturbe, Odysseas Nikolis, Francisco Ramos 0003, Erkuden Rios, Antonios Sarigiannidis, Dimitrios Tzovaras |
A Survey On Honeypots, Honeynets And Their Applications On Smart Grid.  |
NetSoft  |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Xing Ling, Yeonwoo Rho, Chee-Wooi Ten |
Predicting Global Trend of Cybersecurity on Continental Honeynets Using Vector Autoregression.  |
ISGT Europe  |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Pavol Sokol, Jakub Mísek, Martin Husák |
Honeypots and honeynets: issues of privacy.  |
EURASIP J. Inf. Secur.  |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Markus Gruber, Dirk Hoffstadt, Adnan Aziz, Florian Fankhauser, Christian Schanes, Erwin P. Rathgeb, Thomas Grechenig |
Global VoIP security threats - large scale validation based on independent honeynets.  |
Networking  |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Pavol Sokol, Maros Andrejko |
Deploying Honeypots and Honeynets: Issues of Liability.  |
CN  |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Tomas Sochor, Matej Zuzcak |
Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection.  |
CN  |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Pavol Sokol, Martin Husák, Frantiek Liptak |
Deploying Honeypots and Honeynets: Issue of Privacy.  |
ARES  |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Pavol Sokol, Lenka Kleinova, Martin Husák |
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization.  |
EUROCON  |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Napoleon Paxton, Dae-il Jang, Stephen Russell 0001, Gail-Joon Ahn, Ira S. Moskowitz, Paul Hyden |
Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis.  |
HICSS  |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Fahim H. Abbasi, Richard J. Harris 0001, Stephen Marsland, Giovanni S. Moretti |
An exemplar-based learning approach for detection and classification of malicious network streams in honeynets.  |
Secur. Commun. Networks  |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Peter Pisarcík, Pavol Sokol |
Framework for distributed virtual honeynets.  |
SIN  |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Tomas Sochor, Matej Zuzcak |
Study of Internet Threats and Attack Methods Using Honeypots and Honeynets.  |
CN  |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Mohammed H. Sqalli, Syed Naeem Firdous, Khaled Salah 0001, Marwan H. Abu-Amara |
Classifying malicious activities in Honeynets using entropy and volume-based thresholds.  |
Secur. Commun. Networks  |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias |
Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning.  |
NSS  |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Manuel Gil Pérez, Verónica Mateos Lanchas, David Fernández Cambronero, Gregorio Martínez Pérez, Víctor A. Villagrá |
RECLAMO: Virtual and Collaborative Honeynets Based on Trust Management and Autonomous Systems Applied to Intrusion Management.  |
CISIS  |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Fahim H. Abbasi, Richard J. Harris 0001, Giovanni S. Moretti, Aun Haider, Nafees Anwar |
Classification of malicious network streams using honeynets.  |
GLOBECOM  |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Anton Chuvakin |
Honeypots and Honeynets.  |
Encyclopedia of Information Assurance  |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Jordi Herrera-Joancomartí, Cristina Pérez-Solà |
Online Social Honeynets: Trapping Web Crawlers in OSN.  |
MDAI  |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Paul Barford, Yan Chen 0004, Anup Goyal, Zhichun Li, Vern Paxson, Vinod Yegneswaran |
Employing Honeynets For Network Situational Awareness.  |
Cyber Situational Awareness  |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Christopher Hecker, Brian Hay |
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support.  |
HICSS  |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Cristine Hoepers |
Design and implementation of an infrastructure for honeypots and honeynets' information exchange and analysis.  |
|
2008 |
RDF |
|
27 | Christos K. Dimitriadis |
Improving Mobile Core Network Security with Honeynets.  |
IEEE Secur. Priv.  |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Richard A. Wasniowski |
Using Honeynets and Alerts Correlation for Intrusion Detection and Prevention.  |
Security and Management  |
2007 |
DBLP BibTeX RDF |
|
27 | Christos K. Dimitriadis |
Honeynets in 3G - A Game Theoretic Analysis.  |
WOSIS  |
2006 |
DBLP BibTeX RDF |
|
27 | Maximillian Dornseif, Sascha May |
Modelling the costs and benefits of Honeynets  |
CoRR  |
2004 |
DBLP BibTeX RDF |
|
27 | Maximillian Dornseif, Thorsten Holz, Christian N. Klein |
NoSEBrEaK - Attacking Honeynets  |
CoRR  |
2004 |
DBLP BibTeX RDF |
|
27 | Richard Stevens, Hartmut Pohl |
Honeypots und Honeynets.  |
Inform. Spektrum  |
2004 |
DBLP DOI BibTeX RDF |
|
27 | John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver |
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks.  |
IAW  |
2003 |
DBLP BibTeX RDF |
|
24 | John R. Lange, Peter A. Dinda, Fabián E. Bustamante |
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems.  |
RAID  |
2007 |
DBLP DOI BibTeX RDF |
volunteer systems, honeypots, honeynets, wormholes |
24 | Mark Ryan del Moral Talabis |
Honeynet learning: discovering IT security.  |
ACM SIGCSE Bull.  |
2006 |
DBLP DOI BibTeX RDF |
IT education, problem-based learning, Honeynets, IT security |
24 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics Part I: Analyzing the Network.  |
IEEE Secur. Priv.  |
2004 |
DBLP DOI BibTeX RDF |
blackhat, honeypots, honeynets |
24 | Neal Krawetz |
Anti-Honeypot Technology.  |
IEEE Secur. Priv.  |
2004 |
DBLP DOI BibTeX RDF |
spam, honeypots, honeynets, trackers |
24 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics, Part II: Analyzing the Compromised Host.  |
IEEE Secur. Priv.  |
2004 |
DBLP DOI BibTeX RDF |
network analysis, honeypots, honeynets |
20 | Robin Berthier, Dave Kormann, Michel Cukier, Matti A. Hiltunen, Gregg Vesonder, Daniel Sheleheda |
On the Comparison of Network Attack Datasets: An Empirical Analysis.  |
HASE  |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Leonard Kwan, Pradeep Ray, Greg Stephens |
Towards a Methodology for Profiling Cyber Criminals.  |
HICSS  |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Zhichun Li, Lanjia Wang, Yan Chen 0004, Zhi Fu |
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms.  |
ICNP  |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Hao Tu, Zhitang Li, Bin Liu 0013 |
Detecting Botnets by Analyzing DNS Traffic.  |
PAISI  |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, Raghu Ramakrishnan 0001 |
Toward a Query Language for Network Attack Data.  |
ICDE Workshops  |
2006 |
DBLP DOI BibTeX RDF |
|
20 | W. Timothy Strayer, Robert Walsh, Carl Livadas, David E. Lapsley |
Detecting Botnets with Tight Command and Control.  |
LCN  |
2006 |
DBLP DOI BibTeX RDF |
|
20 | George Chamales |
The Honeywall CD-ROM.  |
IEEE Secur. Priv.  |
2004 |
DBLP DOI BibTeX RDF |
honeywall, blackhat, honeypot, hackers, honeynet |
Displaying result #1 - #58 of 58 (100 per page; Change: )
|
|