The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for honeypots with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2004 (25) 2005 (15) 2006-2007 (34) 2008 (23) 2009 (16) 2010-2011 (21) 2012-2013 (24) 2014-2015 (23) 2016 (17) 2017-2018 (29) 2019 (16) 2020 (20) 2021 (17) 2022 (29) 2023 (21) 2024 (2)
Publication types (Num. hits)
article(78) book(2) incollection(5) inproceedings(238) phdthesis(9)
Venues (Conferences, Journals, ...)
CoRR(31) RAID(7) IEEE Secur. Priv.(6) CN(5) DIMVA(5) HICSS(5) ICC(5) ARES(4) CCS(4) Future Internet(4) NOMS(4) ACM Southeast Regional Confere...(3) ACSAC(3) EuroS&P Workshops(3) EuroSys(3) IEEE ICBC(3) More (+10 of total 209)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 139 occurrences of 75 keywords

Results
Found 332 publication records. Showing 332 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
157Sherif M. Khattab, Chatree Sangpachatanaruk, Daniel Mossé, Rami G. Melhem, Taieb Znati Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks. Search on Bibsonomy ICDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
127Xuxian Jiang, Xinyuan Wang 0005 "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
106Iyatiti Mokube, Michele Adams Honeypots: concepts, approaches, and challenges. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF types of honeypots, honeypots, legal issues
97Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. Search on Bibsonomy HCI (16) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks
96Iksu Kim, Myungho Kim The DecoyPort: Redirecting Hackers to Honeypots. Search on Bibsonomy NBiS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
86Kyumin Lee, James Caverlee, Steve Webb Uncovering social spammers: social honeypots + machine learning. Search on Bibsonomy SIGIR The full citation details ... 2010 DBLP  DOI  BibTeX  RDF social honeypots, social media, spam
81Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel 0001 Self Adaptive High Interaction Honeypots Driven by Game Theory. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
81Xinwen Fu, Wei Yu 0002, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham On Recognizing Virtual Honeypots and Countermeasures. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
81Chi-Hung Chi, Ming Li 0002, Dongxi Liu A Method to Obtain Signatures from Honeypots Data. Search on Bibsonomy NPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
77Cliff Changchun Zou, Ryan Cunningham Honeypot-Aware Advanced Botnet Construction and Maintenance. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
77Robert McGrew 0002, Rayford B. Vaughn Experiences with Honeypot Systems: Development, Deployment, and Analysis. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
70Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion Detection Systems, Malware, Honeypots
65Kurniadi Asrigo, Lionel Litty, David Lie Using VMM-based sensors to monitor honeypots. Search on Bibsonomy VEE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF honeypot monitoring, intrusion detection, IDS, virtual machine monitor
65Fabien Pouget, Thorsten Holz A Pointillist Approach for Comparing Honeypots. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
65Vishal Chowdhary, Alok Tongaonkar, Tzi-cker Chiueh Towards Automatic Learning of Valid Services for Honeypots. Search on Bibsonomy ICDCIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
65Marc Dacier, Fabien Pouget, Hervé Debar Honeypots: Practical Means to Validate Malicious Fault Assumptions. Search on Bibsonomy PRDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
61Simon P. Chung, Aloysius K. Mok Collaborative Intrusion Prevention. Search on Bibsonomy WETICE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
61Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang HonIDS: Enhancing Honeypot System with Intrusion Detection Models. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
61Takashi Minohara, Satoshi Ishikawa, Masahiro Amano Centralized Surveillance of Unused Address Space by using Virtual Networks. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Christian Seifert, Ian Welch, Peter Komisarczuk Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF client honeypots, security, algorithms, intrusion detection, performance improvement
51Jon Oberheide, Manish Karir, Zhuoqing Morley Mao Characterizing Dark DNS Behavior. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF darknets, sensors, honeypots, DNS, reconnaissance
50David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen HoneyStat: Local Worm Detection Using Honeypots. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Christian Seifert, Ian Welch, Peter Komisarczuk, Chiraag Uday Aval, Barbara Endicott-Popovsky Identification of malicious web pages through analysis of underlying DNS and web server relationships. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Mark S. Withall, M. Shirantha de Silva, David J. Parish, Iain Phillips 0002 Honey Plotter and the Web of Terror. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Neil C. Rowe Measuring the Effectiveness of Honeypot Counter-Counterdeception. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Iyad Kuwatly, Malek Sraj, Zaid Al Masri, Hassan Artail A Dynamic Honeypot Design for Intrusion Detection. Search on Bibsonomy ICPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Christian Kreibich, Jon Crowcroft Honeycomb: creating intrusion detection signatures using honeypots. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF longest-common-substring algorithms, traffic signatures, suffix trees, honeypots, network intrusion detection, protocol analysis, pattern detection
40Lawrence Teo, Yu-An Sun, Gail-Joon Ahn Defeating Internet Attacks Using Risk Awareness and Active Honeypots. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Japonica, Risk Awareness, Honeypots, Colored Petri Nets
38Nitin Naik, Paul Jenkins, Roger Cooke, Longzhi Yang Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots. Search on Bibsonomy FUZZ-IEEE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
36Anjali Sardana, Ramesh Chandra Joshi Dual-level defense for networks under DDoS attacks. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF entropy, detection, DDoS, Honeypots, characterization
36Kyumin Lee, James Caverlee, Steve Webb The social honeypot project: protecting online communities from spammers. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF social honeypots, social media, spam
36Christian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch Identifying and Analyzing Web Server Attacks. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malicious web servers, client honeypots, Network forensics
36Wilfried N. Gansterer, Michael Ilger Analyzing UCE/UBE traffic. Search on Bibsonomy ICEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF UBE, e-mail traffic, spam, honeypots, UCE
36Asia Slowinska, Herbert Bos The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attack analysis, honeypots, intrusion detection and prevention
36Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security, Honeypots, Forensics, Honeynets
36Neal Krawetz Anti-Honeypot Technology. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF spam, honeypots, honeynets, trackers
36Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky Honeypot Forensics, Part II: Analyzing the Compromised Host. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network analysis, honeypots, honeynets
36Vinod Yegneswaran, Paul Barford, David Plonka On the Design and Use of Internet Sinks for Network Abuse Monitoring. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Deception Systems, Intrusion Detection, Honeypots
35Kevin D. Fairbanks, Ying H. Xia, Henry L. Owen III A Method for Historical Ext3 Inode to Filename Translation on Honeypots. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Oussama Allali, Matthieu Latapy, Clémence Magnien Measurement of eDonkey activity with distributed honeypots. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Corrado Leita, Marc Dacier, Frédéric Massicotte Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Richard Stevens, Hartmut Pohl Honeypots und Honeynets. Search on Bibsonomy Inform. Spektrum The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Anjali Sardana, Ramesh Chandra Joshi Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Routing, DDoS, Honeypot
31Anjali Sardana, Ramesh Chandra Joshi Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Huidong Jin 0001, Olivier Y. de Vel, Ke Zhang, Nianjun Liu Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks. Search on Bibsonomy Australasian Conference on Artificial Intelligence The full citation details ... 2008 DBLP  DOI  BibTeX  RDF density-based cluster visualisation, honeypot data, Knowledge discovery, outlier detection, botnet, Internet security
31Anjali Sardana, Ramesh Chandra Joshi Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Sherif M. Khattab, Rami G. Melhem, Daniel Mossé, Taieb Znati Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Michael Vrable, Justin Ma, Jay Chen, David Moore 0001, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage Scalability, fidelity, and containment in the potemkin virtual honeyfarm. Search on Bibsonomy SOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF honeyfarm, malware, honeypot, virtual machine monitor, copy-on-write
31Phillip Pudney, Jill Slay An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun 0001 Real-Time Emulation of Intrusion Victim in HoneyFarm. Search on Bibsonomy AWCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interception proxy, reverse firewall, Honeypot, intrusion
20Anjali Sardana, Ramesh Chandra Joshi Dual-Level Attack Detection and Characterization for Networks under DDoS. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Entropy, Detection, Distributed Denial of Service, Honeypots
20Jesus Molina, Michel Cukier Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. Search on Bibsonomy NCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF filesystem data, attacker behavior, SSH compromise, Intrusion detection systems, honeypots, empirical analysis
20Saleh I. Almotairi, Andrew J. Clark, George M. Mohay, Jacob Zimmermann Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Internet traffic characterization, principal component analysis, traffic analysis, honeypots
20Urko Zurutuza, Roberto Uribeetxeberria, Diego Zamboni A data mining approach for analysis of worm activity through automatic signature generation. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF automatic signature generation, malware identification, data mining, intrusion detection, honeypots
20Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier Automating the Analysis of Honeypot Data (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Internet threats analysis, malicious behavior characterization, Honeypots
20Georgios Portokalidis, Herbert Bos Eudaemon: involuntary and on-demand emulation against zero-day exploits. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, operating systems, honeypots
20John R. Lange, Peter A. Dinda, Fabián E. Bustamante Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF volunteer systems, honeypots, honeynets, wormholes
20Jan Goebel, Thorsten Holz, Carsten Willems Measurement and Analysis of Autonomous Spreading Malware in a University Environment. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malware, Honeypots, Invasive Software
20Stelios Sidiroglou, Angelos D. Keromytis Countering Network Worms Through Automatic Patch Generation. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF software patching, process sandboxing, Worms, buffer overflows, honeypots, viruses, memory protection
20Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms
20Shiva Azadegan, Vanessa McKenna Use of Honeynets in Computer Security Education. Search on Bibsonomy ACIS-ICIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Computer Security, Honeypots, Honeynets, Security Education
20Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky Honeypot Forensics Part I: Analyzing the Network. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF blackhat, honeypots, honeynets
20Lance Spitzner The Honeynet Project: Trapping the Hackers. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Honeynet Project, early warning and prediction, distributed honeynets, Honeypots, information gathering, honeynets
19Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu, Lin Chen 0009 Optimally Blending Honeypots into Production Networks: Hardness and Algorithms. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Pedro Beltran Lopez, Pantaleone Nespoli, Manuel Gil Pérez Cyber Deception Reactive: TCP Stealth Redirection to On-Demand Honeypots. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut, Marianne Azer Analysis of ICS and SCADA Systems Attacks Using Honeypots. Search on Bibsonomy Future Internet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Jarrod Ragsdale, Rajendra V. Boppana On Designing Low-Risk Honeypots Using Generative Pre-Trained Transformer Models With Curated Inputs. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Veronica Valeros, Maria Rigaki, Sebastian García Attacker Profiling Through Analysis of Attack Patterns in Geographically Distributed Honeypots. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Ruixiang Tang, Jiayi Yuan, Yiming Li, Zirui Liu, Rui Chen, Xia Hu 0001 Setting the Trap: Capturing and Defeating Backdoors in Pretrained Language Models through Honeypots. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Jason M. Pittman, Shaho Alaee To What Extent Are Honeypots and Honeynets Autonomic Computing Systems? Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Muris Sladic, Veronica Valeros, Carlos Adrián Catania, Sebastian García LLM in the Shell: Generative Honeypots. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Daniel Zielinski, Hisham A. Kholidy An Analysis of Honeypots and their Impact as a Cyber Deception Tactic. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Niclas Ilg, Paul Duplys, Dominik Sisejkovic, Michael Menth A survey of contemporary open-source honeypots, frameworks, and tools. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Naya Nagy, Marius Nagy, Ghadeer Alazman, Zahra Hawaidi, Saja Mustafa Alsulaibikh, Layla Alabbad, Sadeem Alfaleh, Areej Aljuaid Quantum Honeypots. Search on Bibsonomy Entropy The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Maria Nintsiou, Elisavet Grigoriou, Paris-Alexandros Karypidis, Theocharis Saoulidis, Eleftherios Fountoukidis, Panagiotis G. Sarigiannidis Threat intelligence using Digital Twin honeypots in Cybersecurity. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Pierre-Marie Junges, Jérôme François, Olivier Festor HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots. Search on Bibsonomy NOMS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yogesh C. Jadhav, Arjun Sable, Maithri Suresh, Manjesh K. Hanawal Securing Containers: Honeypots for Analysing Container Attacks. Search on Bibsonomy COMSNETS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Javier Franco, Abbas Acar, Ahmet Aris, A. Selcuk Uluagac Forensic Analysis of Cryptojacking in Host-Based Docker Containers Using Honeypots. Search on Bibsonomy ICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Stash Kempinski, Shuaib Ichaarine, Savio Sciancalepore, Emmanuele Zambon ICSvertase: A Framework for Purpose-based Design and Classification of ICS Honeypots. Search on Bibsonomy ARES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu, Lin Chen 0009 Optimally Blending Honeypots into Production Networks: Hardness and Algorithms. Search on Bibsonomy SciSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Mahtab Norouzi, Mounir Elgharabawy, Kaiwen Zhang 0001 The Greed Trap: Uncovering Intrinsic Ethereum Honeypots Through Symbolic Execution. Search on Bibsonomy BCCA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. Search on Bibsonomy EuroS&P The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Joseph T. Meier, Thuy D. Nguyen, Neil C. Rowe Hardening Honeypots for Industrial Control Systems. Search on Bibsonomy HICSS The full citation details ... 2023 DBLP  BibTeX  RDF
19Ruixiang (Ryan) Tang, Jiayi Yuan, Yiming Li, Zirui Liu, Rui Chen, Xia Hu 0001 Setting the Trap: Capturing and Defeating Backdoors in Pretrained Language Models through Honeypots. Search on Bibsonomy NeurIPS The full citation details ... 2023 DBLP  BibTeX  RDF
19Huy Quang Ngo, Mingyu Guo, Hung Nguyen 0004 Near Optimal Strategies for Honeypots Placement in Dynamic and Large Active Directory Networks. Search on Bibsonomy AAMAS The full citation details ... 2023 DBLP  BibTeX  RDF
19Joel Scanlan, Paul A. Watters, Jeremy Prichard, Charlotte Hunn, Caroline Spiranovic, Richard Wortley Creating Honeypots to Prevent Online Child Exploitation. Search on Bibsonomy Future Internet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Razvan Florea, Mitica Craus A Game-Theoretic Approach for Network Security Using Honeypots. Search on Bibsonomy Future Internet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Selvakumar Veluchamy, Ruba Soundar Kathavarayan Deep reinforcement learning for building honeypots against runtime DoS attack. Search on Bibsonomy Int. J. Intell. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Christos Alexakos, Kristina Livitckaia, Mike Anastasiadis, Dimitrios Serpanos Identifying Attack Propagation Threads and Root Cause in Internet-of-Vehicle Ecosystems Utilising Honeypots in Connected Autonomous Vehicles. Search on Bibsonomy ERCIM News The full citation details ... 2022 DBLP  BibTeX  RDF
19Huanran Wang, Hui He, Weizhe Zhang, Wenmao Liu, Peng Liu 0005, Amir Javadpour Using honeypots to model botnet attacks on the internet of medical things. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler J. Shipp, Patrick D. McDaniel HoneyModels: Machine Learning Honeypots. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
19Upendra Bartwal, Subhasis Mukhopadhyay, Rohit Negi, Sandeep K. Shukla Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
19Suhyeon Lee 0001, Kwangsoo Cho, Seungjoo Kim Do You Really Need to Disguise Normal Servers as Honeypots? Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Zain Shamsi, Daniel Zhang, Daehyun Kyoung, Alex Liu Measuring and Clustering Network Attackers using Medium-Interaction Honeypots. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Sam Maesschalck, Vasileios Giotsas, Benjamin Green 0001, Nicholas J. P. Race Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Elisavet Grigoriou, Athanasios Liatifis, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Ioannis D. Moscholios, Evangelos K. Markakis, Panagiotis G. Sarigiannidis Protecting IEC 60870-5-104 ICS/SCADA Systems with Honeypots. Search on Bibsonomy CSR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Rakshit Agrawal, Jack W. Stokes, Lukas Rist, Ryan Littlefield, Xun Fan, Ken Hollis, Zane Coppedge, Noah Chesterman, Christian Seifert Long-Term Study of Honeypots in a Public Cloud. Search on Bibsonomy DSN (Supplements) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Nizar Kheir, Loay Abdelrazek, Daniel Cho 0001 Demo Paper: Caught in my Radio Net - Experiment with Honeypots in Radio Access Networks. Search on Bibsonomy ICIN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 332 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license