|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 139 occurrences of 75 keywords
|
|
|
Results
Found 332 publication records. Showing 332 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
157 | Sherif M. Khattab, Chatree Sangpachatanaruk, Daniel Mossé, Rami G. Melhem, Taieb Znati |
Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 24th International Conference on Distributed Computing Systems (ICDCS 2004), 24-26 March 2004, Hachioji, Tokyo, Japan, pp. 328-337, 2004, IEEE Computer Society, 0-7695-2086-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
127 | Xuxian Jiang, Xinyuan Wang 0005 |
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 198-218, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
106 | Iyatiti Mokube, Michele Adams |
Honeypots: concepts, approaches, and challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007, pp. 321-326, 2007, ACM, 978-1-59593-629-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
types of honeypots, honeypots, legal issues |
97 | Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval |
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (16) ![In: Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience, 5th International Conference, FAC 2009 Held as Part of HCI International 2009 San Diego, CA, USA, July 19-24, 2009, Proceedings, pp. 138-147, 2009, Springer, 978-3-642-02811-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks |
96 | Iksu Kim, Myungho Kim |
The DecoyPort: Redirecting Hackers to Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: Network-Based Information Systems, First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 59-68, 2007, Springer, 978-3-540-74572-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
86 | Kyumin Lee, James Caverlee, Steve Webb |
Uncovering social spammers: social honeypots + machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2010, Geneva, Switzerland, July 19-23, 2010, pp. 435-442, 2010, ACM, 978-1-4503-0153-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
social honeypots, social media, spam |
81 | Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel 0001 |
Self Adaptive High Interaction Honeypots Driven by Game Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings, pp. 741-755, 2009, Springer, 978-3-642-05117-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
81 | Xinwen Fu, Wei Yu 0002, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham |
On Recognizing Virtual Honeypots and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC ![In: Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA, pp. 211-218, 2006, IEEE Computer Society, 0-7695-2539-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
81 | Chi-Hung Chi, Ming Li 0002, Dongxi Liu |
A Method to Obtain Signatures from Honeypots Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004, Proceedings, pp. 435-442, 2004, Springer, 3-540-23388-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
77 | Cliff Changchun Zou, Ryan Cunningham |
Honeypot-Aware Advanced Botnet Construction and Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2006 International Conference on Dependable Systems and Networks (DSN 2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings, pp. 199-208, 2006, IEEE Computer Society, 0-7695-2607-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
77 | Robert McGrew 0002, Rayford B. Vaughn |
Experiences with Honeypot Systems: Development, Deployment, and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
70 | Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou |
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 438-451, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Intrusion Detection Systems, Malware, Honeypots |
65 | Kurniadi Asrigo, Lionel Litty, David Lie |
Using VMM-based sensors to monitor honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 2nd International Conference on Virtual Execution Environments, VEE 2006, Ottawa, Ontario, Canada, June 14-16, 2006, pp. 13-23, 2006, ACM, 978-1-59593-332-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
honeypot monitoring, intrusion detection, IDS, virtual machine monitor |
65 | Fabien Pouget, Thorsten Holz |
A Pointillist Approach for Comparing Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings, pp. 51-68, 2005, Springer, 3-540-26613-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
65 | Vishal Chowdhary, Alok Tongaonkar, Tzi-cker Chiueh |
Towards Automatic Learning of Valid Services for Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings, pp. 469-470, 2004, Springer, 3-540-24075-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
65 | Marc Dacier, Fabien Pouget, Hervé Debar |
Honeypots: Practical Means to Validate Malicious Fault Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 3-5 March 2004, Papeete, Tahiti, pp. 383-388, 2004, IEEE Computer Society, 0-7695-2076-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Simon P. Chung, Aloysius K. Mok |
Collaborative Intrusion Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 18-20 June 2007, Paris, France, pp. 395-400, 2007, IEEE Computer Society, 0-7695-2879-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang |
HonIDS: Enhancing Honeypot System with Intrusion Detection Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 135-143, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Takashi Minohara, Satoshi Ishikawa, Masahiro Amano |
Centralized Surveillance of Unused Address Space by using Virtual Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 12-14 December, 2005, Changsha, Hunan, China, pp. 325-332, 2005, IEEE Computer Society, 0-7695-2492-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Christian Seifert, Ian Welch, Peter Komisarczuk |
Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 1426-1432, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
client honeypots, security, algorithms, intrusion detection, performance improvement |
51 | Jon Oberheide, Manish Karir, Zhuoqing Morley Mao |
Characterizing Dark DNS Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings, pp. 140-156, 2007, Springer, 978-3-540-73613-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
darknets, sensors, honeypots, DNS, reconnaissance |
50 | David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen |
HoneyStat: Local Worm Detection Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 39-58, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Christian Seifert, Ian Welch, Peter Komisarczuk, Chiraag Uday Aval, Barbara Endicott-Popovsky |
Identification of malicious web pages through analysis of underlying DNS and web server relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pp. 935-941, 2008, IEEE Computer Society, 978-1-4244-2412-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Mark S. Withall, M. Shirantha de Silva, David J. Parish, Iain Phillips 0002 |
Honey Plotter and the Web of Terror. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 16th International Conference on Computer Communications and Networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007, pp. 1262-1266, 2007, IEEE, 978-1-4244-1251-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Neil C. Rowe |
Measuring the Effectiveness of Honeypot Counter-Counterdeception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Iyad Kuwatly, Malek Sraj, Zaid Al Masri, Hassan Artail |
A Dynamic Honeypot Design for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPS ![In: The IEEE/ACS International Conference on Pervasive Services (ICPS'04), July 19-23, 2004, American University of Beirut (AUB), Lebanon, pp. 95-104, 2004, IEEE Computer Society, 0-7803-8577-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Christian Kreibich, Jon Crowcroft |
Honeycomb: creating intrusion detection signatures using honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 34(1), pp. 51-56, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
longest-common-substring algorithms, traffic signatures, suffix trees, honeypots, network intrusion detection, protocol analysis, pattern detection |
40 | Lawrence Teo, Yu-An Sun, Gail-Joon Ahn |
Defeating Internet Attacks Using Risk Awareness and Active Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 155-168, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Japonica, Risk Awareness, Honeypots, Colored Petri Nets |
38 | Nitin Naik, Paul Jenkins, Roger Cooke, Longzhi Yang |
Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FUZZ-IEEE ![In: 2018 IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2018, Rio de Janeiro, Brazil, July 8-13, 2018, pp. 1-8, 2018, IEEE, 978-1-5090-6020-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
38 | Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas |
HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 434-439, 2012, SciTePress, 978-989-8565-24-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
36 | Anjali Sardana, Ramesh Chandra Joshi |
Dual-level defense for networks under DDoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 733-734, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
entropy, detection, DDoS, Honeypots, characterization |
36 | Kyumin Lee, James Caverlee, Steve Webb |
The social honeypot project: protecting online communities from spammers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 1139-1140, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
social honeypots, social media, spam |
36 | Christian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch |
Identifying and Analyzing Web Server Attacks. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008, pp. 151-161, 2008, Springer, 978-0-387-84926-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
malicious web servers, client honeypots, Network forensics |
36 | Wilfried N. Gansterer, Michael Ilger |
Analyzing UCE/UBE traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007, University of Minnesota, Minneapolis, MN, USA, August 19-22, 2007, pp. 195-204, 2007, ACM, 978-1-59593-700-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
UBE, e-mail traffic, spam, honeypots, UCE |
36 | Asia Slowinska, Herbert Bos |
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 487-500, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
attack analysis, honeypots, intrusion detection and prevention |
36 | Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, pp. 756-767, 2005, Springer, 3-540-25809-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Security, Honeypots, Forensics, Honeynets |
36 | Neal Krawetz |
Anti-Honeypot Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(1), pp. 76-79, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
spam, honeypots, honeynets, trackers |
36 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics, Part II: Analyzing the Compromised Host. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(5), pp. 77-80, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
network analysis, honeypots, honeynets |
36 | Vinod Yegneswaran, Paul Barford, David Plonka |
On the Design and Use of Internet Sinks for Network Abuse Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 146-165, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Deception Systems, Intrusion Detection, Honeypots |
35 | Kevin D. Fairbanks, Ying H. Xia, Henry L. Owen III |
A Method for Historical Ext3 Inode to Filename Translation on Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pp. 392-397, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Oussama Allali, Matthieu Latapy, Clémence Magnien |
Measurement of eDonkey activity with distributed honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp. 1-8, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Corrado Leita, Marc Dacier, Frédéric Massicotte |
Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings, pp. 185-205, 2006, Springer, 3-540-39723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Richard Stevens, Hartmut Pohl |
Honeypots und Honeynets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Spektrum ![In: Inform. Spektrum 27(3), pp. 260-264, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Anjali Sardana, Ramesh Chandra Joshi |
Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIP ![In: International Symposium on Information Processing, ISIP 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, WMWA 2008, Moscow, Russia, 23-25 May 2008, pp. 505-509, 2008, IEEE Computer Society, 978-0-7695-3151-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Routing, DDoS, Honeypot |
31 | Anjali Sardana, Ramesh Chandra Joshi |
Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India, pp. 1-7, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Huidong Jin 0001, Olivier Y. de Vel, Ke Zhang, Nianjun Liu |
Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australasian Conference on Artificial Intelligence ![In: AI 2008: Advances in Artificial Intelligence, 21st Australasian Joint Conference on Artificial Intelligence, Auckland, New Zealand, December 1-5, 2008. Proceedings, pp. 470-481, 2008, Springer, 978-3-540-89377-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
density-based cluster visualisation, honeypot data, Knowledge discovery, outlier detection, botnet, Internet security |
31 | Anjali Sardana, Ramesh Chandra Joshi |
Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 259-262, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Sherif M. Khattab, Rami G. Melhem, Daniel Mossé, Taieb Znati |
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Michael Vrable, Justin Ma, Jay Chen, David Moore 0001, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage |
Scalability, fidelity, and containment in the potemkin virtual honeyfarm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23-26, 2005, pp. 148-162, 2005, ACM, 1-59593-079-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
honeyfarm, malware, honeypot, virtual machine monitor, copy-on-write |
31 | Phillip Pudney, Jill Slay |
An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 29-39, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun 0001 |
Real-Time Emulation of Intrusion Victim in HoneyFarm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWCC ![In: Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings, pp. 143-154, 2004, Springer, 3-540-23898-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
interception proxy, reverse firewall, Honeypot, intrusion |
20 | Anjali Sardana, Ramesh Chandra Joshi |
Dual-Level Attack Detection and Characterization for Networks under DDoS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 9-16, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Entropy, Detection, Distributed Denial of Service, Honeypots |
20 | Jesus Molina, Michel Cukier |
Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, NCA 2009, July 9-11, 2009, Cambridge, Massachusetts, USA, pp. 163-170, 2009, IEEE Computer Society, 978-0-7695-3698-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
filesystem data, attacker behavior, SSH compromise, Intrusion detection systems, honeypots, empirical analysis |
20 | Saleh I. Almotairi, Andrew J. Clark, George M. Mohay, Jacob Zimmermann |
Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC Workshops ![In: IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings, pp. 147-154, 2008, IEEE Computer Society, 978-0-7695-3354-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Internet traffic characterization, principal component analysis, traffic analysis, honeypots |
20 | Urko Zurutuza, Roberto Uribeetxeberria, Diego Zamboni |
A data mining approach for analysis of worm activity through automatic signature generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 61-70, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
automatic signature generation, malware identification, data mining, intrusion detection, honeypots |
20 | Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier |
Automating the Analysis of Honeypot Data (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 406-407, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Internet threats analysis, malicious behavior characterization, Honeypots |
20 | Georgios Portokalidis, Herbert Bos |
Eudaemon: involuntary and on-demand emulation against zero-day exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, pp. 287-299, 2008, ACM, 978-1-60558-013-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, operating systems, honeypots |
20 | John R. Lange, Peter A. Dinda, Fabián E. Bustamante |
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 317-336, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
volunteer systems, honeypots, honeynets, wormholes |
20 | Jan Goebel, Thorsten Holz, Carsten Willems |
Measurement and Analysis of Autonomous Spreading Malware in a University Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings, pp. 109-128, 2007, Springer, 978-3-540-73613-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Malware, Honeypots, Invasive Software |
20 | Stelios Sidiroglou, Angelos D. Keromytis |
Countering Network Worms Through Automatic Patch Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(6), pp. 41-49, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
software patching, process sandboxing, Worms, buffer overflows, honeypots, viruses, memory protection |
20 | Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 235-248, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms |
20 | Shiva Azadegan, Vanessa McKenna |
Use of Honeynets in Computer Security Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 14-16 July 2005, Jeju Island, South Korea, pp. 320-325, 2005, IEEE Computer Society, 0-7695-2296-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Computer Security, Honeypots, Honeynets, Security Education |
20 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics Part I: Analyzing the Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(4), pp. 72-78, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
blackhat, honeypots, honeynets |
20 | Lance Spitzner |
The Honeynet Project: Trapping the Hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(2), pp. 15-23, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Honeynet Project, early warning and prediction, distributed honeynets, Honeypots, information gathering, honeynets |
19 | Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu, Lin Chen 0009 |
Optimally Blending Honeypots into Production Networks: Hardness and Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.06763, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Pedro Beltran Lopez, Pantaleone Nespoli, Manuel Gil Pérez |
Cyber Deception Reactive: TCP Stealth Redirection to On-Demand Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.09191, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut, Marianne Azer |
Analysis of ICS and SCADA Systems Attacks Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 15(7), pp. 241, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Jarrod Ragsdale, Rajendra V. Boppana |
On Designing Low-Risk Honeypots Using Generative Pre-Trained Transformer Models With Curated Inputs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 117528-117545, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Veronica Valeros, Maria Rigaki, Sebastian García |
Attacker Profiling Through Analysis of Attack Patterns in Geographically Distributed Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.01346, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Ruixiang Tang, Jiayi Yuan, Yiming Li, Zirui Liu, Rui Chen, Xia Hu 0001 |
Setting the Trap: Capturing and Defeating Backdoors in Pretrained Language Models through Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.18633, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch |
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.04614, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Jason M. Pittman, Shaho Alaee |
To What Extent Are Honeypots and Honeynets Autonomic Computing Systems? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.11038, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Muris Sladic, Veronica Valeros, Carlos Adrián Catania, Sebastian García |
LLM in the Shell: Generative Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.00155, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Daniel Zielinski, Hisham A. Kholidy |
An Analysis of Honeypots and their Impact as a Cyber Deception Tactic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.00045, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Niclas Ilg, Paul Duplys, Dominik Sisejkovic, Michael Menth |
A survey of contemporary open-source honeypots, frameworks, and tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 220, pp. 103737, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Naya Nagy, Marius Nagy, Ghadeer Alazman, Zahra Hawaidi, Saja Mustafa Alsulaibikh, Layla Alabbad, Sadeem Alfaleh, Areej Aljuaid |
Quantum Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 25(10), pp. 1461, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Maria Nintsiou, Elisavet Grigoriou, Paris-Alexandros Karypidis, Theocharis Saoulidis, Eleftherios Fountoukidis, Panagiotis G. Sarigiannidis |
Threat intelligence using Digital Twin honeypots in Cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2023, Venice, Italy, July 31 - Aug. 2, 2023, pp. 530-537, 2023, IEEE, 979-8-3503-1170-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Pierre-Marie Junges, Jérôme François, Olivier Festor |
HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: NOMS 2023, IEEE/IFIP Network Operations and Management Symposium, Miami, FL, USA, May 8-12, 2023, pp. 1-9, 2023, IEEE, 978-1-6654-7716-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Yogesh C. Jadhav, Arjun Sable, Maithri Suresh, Manjesh K. Hanawal |
Securing Containers: Honeypots for Analysing Container Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSNETS ![In: 15th International Conference on COMmunication Systems & NETworkS, COMSNETS 2023, Bangalore, India, January 3-8, 2023, pp. 225-227, 2023, IEEE, 978-1-6654-7706-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Javier Franco, Abbas Acar, Ahmet Aris, A. Selcuk Uluagac |
Forensic Analysis of Cryptojacking in Host-Based Docker Containers Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2023, Rome, Italy, May 28 - June 1, 2023, pp. 4860-4865, 2023, IEEE, 978-1-5386-7462-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Stash Kempinski, Shuaib Ichaarine, Savio Sciancalepore, Emmanuele Zambon |
ICSvertase: A Framework for Purpose-based Design and Classification of ICS Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023, pp. 114:1-114:10, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu, Lin Chen 0009 |
Optimally Blending Honeypots into Production Networks: Hardness and Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SciSec ![In: Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings, pp. 285-304, 2023, Springer, 978-3-031-45932-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Mahtab Norouzi, Mounir Elgharabawy, Kaiwen Zhang 0001 |
The Greed Trap: Uncovering Intrinsic Ethereum Honeypots Through Symbolic Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCCA ![In: Fifth International Conference on Blockchain Computing and Applications, BCCA 2023, Kuwait, Kuwait, October 24-26, 2023, pp. 440-447, 2023, IEEE, 979-8-3503-3923-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch |
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023, Delft, Netherlands, July 3-7, 2023, pp. 576-591, 2023, IEEE, 978-1-6654-6512-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Joseph T. Meier, Thuy D. Nguyen, Neil C. Rowe |
Hardening Honeypots for Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 56th Hawaii International Conference on System Sciences, HICSS 2023, Maui, Hawaii, USA, January 3-6, 2023, pp. 6665-6674, 2023, ScholarSpace, 978-0-9981331-6-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
19 | Ruixiang (Ryan) Tang, Jiayi Yuan, Yiming Li, Zirui Liu, Rui Chen, Xia Hu 0001 |
Setting the Trap: Capturing and Defeating Backdoors in Pretrained Language Models through Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NeurIPS ![In: Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023., 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
19 | Huy Quang Ngo, Mingyu Guo, Hung Nguyen 0004 |
Near Optimal Strategies for Honeypots Placement in Dynamic and Large Active Directory Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2023, London, United Kingdom, 29 May 2023 - 2 June 2023, pp. 2517-2519, 2023, ACM, 978-1-4503-9432-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
19 | Joel Scanlan, Paul A. Watters, Jeremy Prichard, Charlotte Hunn, Caroline Spiranovic, Richard Wortley |
Creating Honeypots to Prevent Online Child Exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 14(4), pp. 121, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Razvan Florea, Mitica Craus |
A Game-Theoretic Approach for Network Security Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 14(12), pp. 362, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Selvakumar Veluchamy, Ruba Soundar Kathavarayan |
Deep reinforcement learning for building honeypots against runtime DoS attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Syst. ![In: Int. J. Intell. Syst. 37(7), pp. 3981-4007, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Christos Alexakos, Kristina Livitckaia, Mike Anastasiadis, Dimitrios Serpanos |
Identifying Attack Propagation Threads and Root Cause in Internet-of-Vehicle Ecosystems Utilising Honeypots in Connected Autonomous Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ERCIM News ![In: ERCIM News 2022(129), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
19 | Huanran Wang, Hui He, Weizhe Zhang, Wenmao Liu, Peng Liu 0005, Amir Javadpour |
Using honeypots to model botnet attacks on the internet of medical things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 102, pp. 108212, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler J. Shipp, Patrick D. McDaniel |
HoneyModels: Machine Learning Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.10309, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
19 | Upendra Bartwal, Subhasis Mukhopadhyay, Rohit Negi, Sandeep K. Shukla |
Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2201.05326, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
19 | Suhyeon Lee 0001, Kwangsoo Cho, Seungjoo Kim |
Do You Really Need to Disguise Normal Servers as Honeypots? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.17399, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Zain Shamsi, Daniel Zhang, Daehyun Kyoung, Alex Liu |
Measuring and Clustering Network Attackers using Medium-Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2206.13614, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Sam Maesschalck, Vasileios Giotsas, Benjamin Green 0001, Nicholas J. P. Race |
Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 114, pp. 102598, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Elisavet Grigoriou, Athanasios Liatifis, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Ioannis D. Moscholios, Evangelos K. Markakis, Panagiotis G. Sarigiannidis |
Protecting IEC 60870-5-104 ICS/SCADA Systems with Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2022, Rhodes, Greece, July 27-29, 2022, pp. 345-350, 2022, IEEE, 978-1-6654-9952-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Rakshit Agrawal, Jack W. Stokes, Lukas Rist, Ryan Littlefield, Xun Fan, Ken Hollis, Zane Coppedge, Noah Chesterman, Christian Seifert |
Long-Term Study of Honeypots in a Public Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN (Supplements) ![In: 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022, Supplemental Volume, Baltimore, MD, USA, June 27-30, 2022, pp. 1-4, 2022, IEEE, 978-1-6654-0260-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Nizar Kheir, Loay Abdelrazek, Daniel Cho 0001 |
Demo Paper: Caught in my Radio Net - Experiment with Honeypots in Radio Access Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIN ![In: 25th Conference on Innovation in Clouds, Internet and Networks, ICIN 2022, Paris, France, March 7-10, 2022, pp. 1-3, 2022, IEEE, 978-1-7281-8688-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 332 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|