The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for honeypots with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2004 (25) 2005 (15) 2006-2007 (34) 2008 (23) 2009 (16) 2010-2011 (21) 2012-2013 (24) 2014-2015 (23) 2016 (17) 2017-2018 (29) 2019 (16) 2020 (20) 2021 (17) 2022 (29) 2023 (21) 2024 (2)
Publication types (Num. hits)
article(78) book(2) incollection(5) inproceedings(238) phdthesis(9)
Venues (Conferences, Journals, ...)
CoRR(31) RAID(7) IEEE Secur. Priv.(6) CN(5) DIMVA(5) HICSS(5) ICC(5) ARES(4) CCS(4) Future Internet(4) NOMS(4) ACM Southeast Regional Confere...(3) ACSAC(3) EuroS&P Workshops(3) EuroSys(3) IEEE ICBC(3) More (+10 of total 209)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 139 occurrences of 75 keywords

Results
Found 332 publication records. Showing 332 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Wuyan Sun, Chuyang Yuan, Wenjun Fan A Measurement of Real-world Attack Connections toward Honeypots. Search on Bibsonomy M&N The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Brian A. Foley, Neil C. Rowe, Thuy D. Nguyen Analyzing Attacks on Client-Side Honeypots from Representative Malicious Web Sites. Search on Bibsonomy CSCI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Jaime C. Acosta Poster: Toward Dynamic, Session-Preserving, Transition from Low to High Interaction Honeypots. Search on Bibsonomy SACMAT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Thomas Favale, Danilo Giordano, Idilio Drago, Marco Mellia What Scanners do at L7? Exploring Horizontal Honeypots for Security Monitoring. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Fabian Franzen, Lion Steger, Johannes Zirngibl, Patrick Sattler Looking for Honey Once Again: Detecting RDP and SMB Honeypots on the Internet. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Zain Shamsi, Daniel Zhang, Daehyun Kyoung, Alex Liu Measuring and Clustering Network Attackers using Medium-Interaction Honeypots. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Songsong Liu, Pengbin Feng, Jiahao Cao, Xu He, Tommy Chin, Kun Sun 0001, Qi Li 0002 Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots. Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Samuel Kelly Brew, Emmanuel Ahene Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source. Search on Bibsonomy FCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Upendra Bartwal, Subhasis Mukhopadhyay, Rohit Negi, Sandeep K. Shukla Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Jaime C. Acosta Locally-Hosted Fidelity-Adaptive Honeypots with Connection-Preserving Capabilities. Search on Bibsonomy MILCOM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Suhyeon Lee 0001, Kwangsoo Cho, Seungjoo Kim Do You Really Need to Disguise Normal Servers as Honeypots? Search on Bibsonomy MILCOM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Jouni Ihanus, Tero Kokkonen, Timo Hämäläinen 0002 Modelling Medical Devices with Honeypots: A Conceptual Framework. Search on Bibsonomy WorldCIST (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Junior Samuel López-Yépez, Antoine Fagette Increasing attacker engagement on SSH honeypots using semantic embeddings of cyber-attack patterns and deep reinforcement learning. Search on Bibsonomy SSCI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots. Search on Bibsonomy ACSAC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Yudai Yamamoto, Shingo Yamaguchi A Method to Prevent Known Attacks and Their Variants by Combining Honeypots and IPS. Search on Bibsonomy GCCE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Simão Silva, Patrícia R. Sousa, João S. Resende, Luis Filipe Coelho Antunes Threat Detection and Mitigation with Honeypots: A Modular Approach for IoT. Search on Bibsonomy TrustBus The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Forough Ja'fari, Seyedakbar Mostafavi, Kiarash Mizanian, Emad Jafari An intelligent botnet blocking approach in software defined networks using honeypots. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. Search on Bibsonomy IEEE Commun. Surv. Tutorials The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Daniel Reti, Norman Becker Escape the Fake: Introducing Simulated Container-Escapes for Honeypots. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Christopher Kelly, Nikolaos Pitropakis, Alexios Mylonas, Sean McKeown, William J. Buchanan A Comparative Analysis of Honeypots on Different Cloud Platforms. Search on Bibsonomy Sensors The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Shawn Shan Using Honeypots to Catch Adversarial Attacks on Neural Networks. Search on Bibsonomy MTD@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Ilias Siniosoglou, Vasileios Argyriou, Thomas Lagkas, Apostolos Tsiakalos, Antonios Sarigiannidis, Panagiotis G. Sarigiannidis Covert Distributed Training of Deep Federated Industrial Honeypots. Search on Bibsonomy GLOBECOM (Workshops) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Neil C. Rowe, Thuy D. Nguyen, Jeffery T. Dougherty, Matthew C. Bieker, Darry Pilkington Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots. Search on Bibsonomy NCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Moeka Yamamoto, Shohei Kakei, Shoichi Saito FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices. Search on Bibsonomy CANDAR (Workshops) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Vitalii Susukailo, Sviatoslav Vasylyshyn, Ivan Opirskyy, Volodymyr Buriachok, Olena Riabchun Cybercrimes Investigation via Honeypots in Cloud Environments (short paper). Search on Bibsonomy CPITS I The full citation details ... 2021 DBLP  BibTeX  RDF
19Jay Thom, Yash Shah, Shamik Sengupta Correlation of Cyber Threat Intelligence Data Across Global Honeypots. Search on Bibsonomy CCWC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler J. Shipp, Patrick D. McDaniel HoneyModels: Machine Learning Honeypots. Search on Bibsonomy MILCOM The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Kota Chin, Kazumasa Omote Analysis of Attack Activities for Honeypots Installation in Ethereum Network. Search on Bibsonomy Blockchain The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Antonina Kashtalian, Oleg Savenko, Anatoliy Sachenko Agglomerative Clustering of Data Collected by Honeypots. Search on Bibsonomy IDAACS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Danyil Zhuravchak, Taras Ustyianovych, Valery Dudykevych, Bogdan Venny, Khrystyna Ruda Ransomware Prevention System Design based on File Symbolic Linking Honeypots. Search on Bibsonomy IDAACS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Thai Le, Noseong Park, Dongwon Lee 0001 A Sweet Rabbit Hole by DARCY: Using Honeypots to Detect Universal Trigger's Adversarial Attacks. Search on Bibsonomy ACL/IJCNLP (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Johannes Krupp Using honeypots to trace back amplification DDoS attacks. Search on Bibsonomy 2021   RDF
19Weizhe Zhang, Bin Zhang 0048, Ying Zhou, Hui He, Zeyu Ding 0003 An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Lynda Boukela, Gongxuan Zhang, Samia Bouzefrane 0001, Junlong Zhou An outlier ensemble for unsupervised anomaly detection in honeypots data. Search on Bibsonomy Intell. Data Anal. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Nicholas Carlini A Partial Break of the Honeypots Defense to Catch Adversarial Attacks. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Linan Huang, Quanyan Zhu Cognitive Honeypots against Lateral Movement for Mitigation of Long-Term Vulnerability. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Shawn Shan, Emily Wenger, Bolun Wang, Bo Li 0026, Haitao Zheng 0001, Ben Y. Zhao Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks. Search on Bibsonomy CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Christof Ferreira Torres, Mathis Baden, Radu State Towards Usable Protection Against Honeypots. Search on Bibsonomy IEEE ICBC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote Profiling of Malicious Users Using Simple Honeypots on the Ethereum Blockchain Network. Search on Bibsonomy IEEE ICBC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Ramiro Camino, Christof Ferreira Torres, Mathis Baden, Radu State A Data Science Approach for Detecting Honeypots in Ethereum. Search on Bibsonomy IEEE ICBC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19João M. Ceron, Christian Scholten, Aiko Pras, Jair Santanna MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification. Search on Bibsonomy NOMS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Linan Huang, Quanyan Zhu Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots. Search on Bibsonomy GameSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Angelo Furfaro, Francesco Lupia, Domenico Saccà Gathering Malware Data through High-Interaction Honeypots. Search on Bibsonomy SEBD The full citation details ... 2020 DBLP  BibTeX  RDF
19Stefano Bistarelli, Emanuele Bosimini, Francesco Santini 0001 A Report on the Security of Home Connections with IoT and Docker Honeypots. Search on Bibsonomy ITASEC The full citation details ... 2020 DBLP  BibTeX  RDF
19Neil C. Rowe, Thuy D. Nguyen, Marian Kendrick, Zaky Rucker, Dahae Hyun, Justin Brown Creating Convincing Industrial-Control-System Honeypots. Search on Bibsonomy HICSS The full citation details ... 2020 DBLP  BibTeX  RDF
19Jafar Haadi Jafarian, Amirreza Niakanlahiji Delivering Honeypots as a Service. Search on Bibsonomy HICSS The full citation details ... 2020 DBLP  BibTeX  RDF
19Jonathan Schler, Elisheva Bonchek-Dokow Utilizing Natural Honeypots for Efficiently Labeling Astroturfer Profiles. Search on Bibsonomy EKAW (Posters & Demos) The full citation details ... 2020 DBLP  BibTeX  RDF
19Jouni Ihanus, Tero Kokkonen Modelling Medical Devices with Honeypots. Search on Bibsonomy NEW2AN/ruSMART The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Bryson Lingenfelter, Iman Vakilinia, Shamik Sengupta Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots. Search on Bibsonomy CCWC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Sergio Vidal-González, Isaías García-Rodríguez, Héctor Alaiz-Moretón, Carmen Benavides-Cuellar, José Alberto Benítez-Andrades, María Teresa García-Ordás, Paulo Novais Analyzing IoT-Based Botnet Malware Activity with Distributed Low Interaction Honeypots. Search on Bibsonomy WorldCIST (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote Profiling of Malicious Users Targeting Ethereum's RPC Port Using Simple Honeypots. Search on Bibsonomy Blockchain The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Alexander Vetterl Honeypots in the age of universal attacks and the Internet of Things. Search on Bibsonomy 2020   RDF
19Matej Zuzcak, Petr Bujok Causal analysis of attacks against honeypots based on properties of countries. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Yang Li 0052, Leyi Shi, Haijie Feng A Game-Theoretic Analysis for Distributed Honeypots. Search on Bibsonomy Future Internet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Christof Ferreira Torres, Mathis Steichen The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
19Adrian Pauna, Ion Bica, Florin Pop, Aniello Castiglione On the rewards of self-adaptive IoT honeypots. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Shun Morishita, Takuya Hoizumi, Wataru Ueno, Rui Tanabe, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots. (PDF / PS) Search on Bibsonomy IM The full citation details ... 2019 DBLP  BibTeX  RDF
19Christos Dalamagkas, Panagiotis G. Sarigiannidis, Dimosthenis Ioannidis, Eider Iturbe, Odysseas Nikolis, Francisco Ramos 0003, Erkuden Rios, Antonios Sarigiannidis, Dimitrios Tzovaras A Survey On Honeypots, Honeynets And Their Applications On Smart Grid. Search on Bibsonomy NetSoft The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Pietro Ferretti, Marcello Pogliani, Stefano Zanero Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots. Search on Bibsonomy CPS-SPC@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Michael A. Haney Leveraging Cyber-Physical System Honeypots to Enhance Threat Intelligence. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Lukás Zobal, Dusan Kolár, Radek Fujdiak Current State of Honeypots and Deception Strategies in Cybersecurity. Search on Bibsonomy ICUMT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Mohammad-Reza Zamiri-Gourabi, Ali Razmjoo-Qalaei, Babak Amin Azad Gas what?: I can see your GasPots. Studying the fingerprintability of ICS honeypots in the wild. Search on Bibsonomy ICSS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Fadi Younis, Ali Miri Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks. Search on Bibsonomy ACNS Workshops The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Christof Ferreira Torres, Mathis Steichen, Radu State The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2019 DBLP  BibTeX  RDF
19Xupeng Luo, Qiao Yan, Mingde Wang, Wenyao Huang Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT. Search on Bibsonomy ComComAP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Johann Bauer, Johannes Goltz, Thomas Mundt, Simeon Wiedenmann Honeypots for Threat Intelligence in Building Automation Systems. Search on Bibsonomy ComComAP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Alexander Vetterl, Richard Clayton 0001, Ian Walden Counting Outdated Honeypots: Legal and Useful. Search on Bibsonomy IEEE Symposium on Security and Privacy Workshops The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Brij B. Gupta, Alisha Gupta Assessment of Honeypots: Issues, Challenges and Future Directions. Search on Bibsonomy Int. J. Cloud Appl. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Laurenz A. Cornelissen, Richard J. Barnett, Morakane A. M. Kepa, Daniel Loebenberg-Novitzkas, Jacques Jordaan Deploying South African Social Honeypots on Twitter. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
19Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui A security approach based on honeypots: Protecting Online Social network from malicious profiles. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
19Tanmoy Chakraborty 0002, Sushil Jajodia, Noseong Park, Andrea Pugliese 0001, Edoardo Serra, V. S. Subrahmanian Hybrid adversarial defense: Merging honeypots and traditional security methods. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Tyrone S. Toland, Sebastian Kollmannsperger, J. Bernard Brewton, William B. Craft Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield. Search on Bibsonomy Computer and Network Security Essentials The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Mark Bilinski, Ryan Gabrys, Justin Mauger Optimal Placement of Honeypots for Network Defense. Search on Bibsonomy GameSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Tomás Bajtos, Pavol Sokol, Terézia Mézesová Virtual honeypots and detection of telnet botnets. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Marius Musch, Martin Härterich, Martin Johns Towards an Automatic Generation of Low-Interaction Web Application Honeypots. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Alexander Vetterl, Richard Clayton 0001 Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale. Search on Bibsonomy WOOT @ USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
19Ryoh Akiyoshi, Daisuke Kotani, Yasuo Okabe Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet. Search on Bibsonomy COMPSAC (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Laurenz A. Cornelissen, Richard J. Barnett, Morakane A. M. Kepa, Daniel Loebenberg-Novitzkas, Jacques Jordaan Deploying South African social honeypots on Twitter. Search on Bibsonomy SAICSIT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Óscar Navarro, Servilio Alonso Joan Balbastre, Stefan Beyer Gathering Intelligence Through Realistic Industrial Control System Honeypots - A Real-World Industrial Experience Report. Search on Bibsonomy CRITIS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Nitin Naik, Paul Jenkins A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots. Search on Bibsonomy FUSION The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Antonio Acien, Ana Nieto, Gerardo Fernandez, Javier López 0001 A Comprehensive Methodology for Deploying IoT Honeypots. Search on Bibsonomy TrustBus The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Abigail Paradise, Asaf Shabtai, Rami Puzis, Aviad Elyashar, Yuval Elovici, Mehran Roshandel, Christoph Peylo Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Pavol Sokol, Jakub Mísek, Martin Husák Honeypots and honeynets: issues of privacy. Search on Bibsonomy EURASIP J. Inf. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Juan Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici SIPHON: Towards Scalable High-Interaction Physical Honeypots. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
19Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha Honeypots for employee information security awareness and education training: A conceptual EASY training model. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
19Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Youki Kadobayashi Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots. Search on Bibsonomy Comput. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model. Search on Bibsonomy Contemporary Digital Forensic Investigations of Cloud and Mobile Applications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Juan David Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici SIPHON: Towards Scalable High-Interaction Physical Honeypots. Search on Bibsonomy CPSS@AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Matej Zuzcak, Tomas Sochor Behavioral Analysis of Bot Activity in Infected Systems Using Honeypots. Search on Bibsonomy CN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Alexander Kedrowitsch, Danfeng (Daphne) Yao, Gang Wang 0011, Kirk W. Cameron A First Look: Using Linux Containers for Deceptive Honeypots. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Martin Valicek, Gregor Schramm, Martin Pirker, Sebastian Schrittwieser Creation and Integration of Remote High Interaction Honeypots. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Abdeljalil Agnaou, Anas Abou El Kalam, Abdellah Ait Ouahman Towards a Collaborative Architecture of Honeypots. Search on Bibsonomy AICCSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Gerardo Fernandez, Ana Nieto, Javier López 0001 Modeling Malware-driven Honeypots. Search on Bibsonomy TrustBus The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Omar Zeyad Akif Secure authentication procedures based on timed passwords, honeypots, honeywords and multi-factor techniques. Search on Bibsonomy 2017   RDF
19Rajalakshmi Selvaraj, Venu Madhav Kuthadi, Tshilidzi Marwala Ant-based distributed denial of service detection technique using roaming virtual honeypots. Search on Bibsonomy IET Commun. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Stephan Lau, Johannes Klick, Stephan Arndt, Volker Roth 0002 POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Daniele Antonioli, Anand Agrawal, Nils Ole Tippenhauer Towards High-Interaction Virtual ICS Honeypots-in-a-Box. Search on Bibsonomy CPS-SPC@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 332 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license