Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Wuyan Sun, Chuyang Yuan, Wenjun Fan |
A Measurement of Real-world Attack Connections toward Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
M&N ![In: IEEE International Symposium on Measurements & Networking, M&N 2022, Padua, Italy, July 18-20, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-8362-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Brian A. Foley, Neil C. Rowe, Thuy D. Nguyen |
Analyzing Attacks on Client-Side Honeypots from Representative Malicious Web Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCI ![In: International Conference on Computational Science and Computational Intelligence, CSCI 2022, Las Vegas, NV, USA, December 14-16, 2022, pp. 904-909, 2022, IEEE, 979-8-3503-2028-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Jaime C. Acosta |
Poster: Toward Dynamic, Session-Preserving, Transition from Low to High Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022, pp. 255-257, 2022, ACM, 978-1-4503-9357-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Thomas Favale, Danilo Giordano, Idilio Drago, Marco Mellia |
What Scanners do at L7? Exploring Horizontal Honeypots for Security Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P Workshops ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2022 - Workshops, Genoa, Italy, June 6-10, 2022, pp. 307-313, 2022, IEEE, 978-1-6654-9560-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Fabian Franzen, Lion Steger, Johannes Zirngibl, Patrick Sattler |
Looking for Honey Once Again: Detecting RDP and SMB Honeypots on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P Workshops ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2022 - Workshops, Genoa, Italy, June 6-10, 2022, pp. 266-277, 2022, IEEE, 978-1-6654-9560-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Zain Shamsi, Daniel Zhang, Daehyun Kyoung, Alex Liu |
Measuring and Clustering Network Attackers using Medium-Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P Workshops ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2022 - Workshops, Genoa, Italy, June 6-10, 2022, pp. 294-306, 2022, IEEE, 978-1-6654-9560-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Songsong Liu, Pengbin Feng, Jiahao Cao, Xu He, Tommy Chin, Kun Sun 0001, Qi Li 0002 |
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings, pp. 197-217, 2022, Springer, 978-3-031-09483-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Samuel Kelly Brew, Emmanuel Ahene |
Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 163-179, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Upendra Bartwal, Subhasis Mukhopadhyay, Rohit Negi, Sandeep K. Shukla |
Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: IEEE Conference on Dependable and Secure Computing, DSC 2022, Edinburgh, UK, June 22-24, 2022, pp. 1-8, 2022, IEEE, 978-1-6654-2141-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Jaime C. Acosta |
Locally-Hosted Fidelity-Adaptive Honeypots with Connection-Preserving Capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MILCOM ![In: IEEE Military Communications Conference, MILCOM 2022, Rockville, MD, USA, November 28 - December 2, 2022, pp. 154-159, 2022, IEEE, 978-1-6654-8534-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Suhyeon Lee 0001, Kwangsoo Cho, Seungjoo Kim |
Do You Really Need to Disguise Normal Servers as Honeypots? ![Search on Bibsonomy](Pics/bibsonomy.png) |
MILCOM ![In: IEEE Military Communications Conference, MILCOM 2022, Rockville, MD, USA, November 28 - December 2, 2022, pp. 166-172, 2022, IEEE, 978-1-6654-8534-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Jouni Ihanus, Tero Kokkonen, Timo Hämäläinen 0002 |
Modelling Medical Devices with Honeypots: A Conceptual Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIST (1) ![In: Information Systems and Technologies - WorldCIST 2022, Volume 1, Budva, Montenegro, 12-14 April, 2022., pp. 145-155, 2022, Springer, 978-3-031-04825-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Junior Samuel López-Yépez, Antoine Fagette |
Increasing attacker engagement on SSH honeypots using semantic embeddings of cyber-attack patterns and deep reinforcement learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSCI ![In: IEEE Symposium Series on Computational Intelligence, SSCI 2022, Singapore, December 4-7, 2022, pp. 389-395, 2022, IEEE, 978-1-6654-8768-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis |
Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5-9, 2022, pp. 742-755, 2022, ACM, 978-1-4503-9759-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yudai Yamamoto, Shingo Yamaguchi |
A Method to Prevent Known Attacks and Their Variants by Combining Honeypots and IPS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCCE ![In: 11th IEEE Global Conference on Consumer Electronics, GCCE 2022, Osaka, Japan, October 18-21, 2022, pp. 302-305, 2022, IEEE, 978-1-6654-9232-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Simão Silva, Patrícia R. Sousa, João S. Resende, Luis Filipe Coelho Antunes |
Threat Detection and Mitigation with Honeypots: A Modular Approach for IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business - 19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings, pp. 66-80, 2022, Springer, 978-3-031-17925-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Forough Ja'fari, Seyedakbar Mostafavi, Kiarash Mizanian, Emad Jafari |
An intelligent botnet blocking approach in software defined networks using honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 12(2), pp. 2993-3016, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac |
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Surv. Tutorials ![In: IEEE Commun. Surv. Tutorials 23(4), pp. 2351-2383, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac |
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2108.02287, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Daniel Reti, Norman Becker |
Escape the Fake: Introducing Simulated Container-Escapes for Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2104.03651, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Christopher Kelly, Nikolaos Pitropakis, Alexios Mylonas, Sean McKeown, William J. Buchanan |
A Comparative Analysis of Honeypots on Different Cloud Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 21(7), pp. 2433, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Shawn Shan |
Using Honeypots to Catch Adversarial Attacks on Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MTD@CCS ![In: MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, Virtual Event, Republic of Korea, 15 November 2021, pp. 25, 2021, ACM, 978-1-4503-8658-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Ilias Siniosoglou, Vasileios Argyriou, Thomas Lagkas, Apostolos Tsiakalos, Antonios Sarigiannidis, Panagiotis G. Sarigiannidis |
Covert Distributed Training of Deep Federated Industrial Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM (Workshops) ![In: IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-2390-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Neil C. Rowe, Thuy D. Nguyen, Jeffery T. Dougherty, Matthew C. Bieker, Darry Pilkington |
Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCS ![In: National Cyber Summit (NCS) Research Track 2021, Huntsville, AL, USA, September 28-30, 2021, pp. 151-162, 2021, Springer, 978-3-030-84613-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Moeka Yamamoto, Shohei Kakei, Shoichi Saito |
FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANDAR (Workshops) ![In: Ninth International Symposium on Computing and Networking, CANDAR 2021 - Workshops, Matsue, Japan, 23-26 November 2021, pp. 405-411, 2021, IEEE, 978-1-6654-1218-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Vitalii Susukailo, Sviatoslav Vasylyshyn, Ivan Opirskyy, Volodymyr Buriachok, Olena Riabchun |
Cybercrimes Investigation via Honeypots in Cloud Environments (short paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPITS I ![In: Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), Kyiv, Ukraine, January 28, 2021 (online)., pp. 91-96, 2021, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Jay Thom, Yash Shah, Shamik Sengupta |
Correlation of Cyber Threat Intelligence Data Across Global Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCWC ![In: 11th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2021, Las Vegas, NV, USA, January 27-30, 2021, pp. 766-772, 2021, IEEE, 978-1-6654-1490-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler J. Shipp, Patrick D. McDaniel |
HoneyModels: Machine Learning Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MILCOM ![In: 2021 IEEE Military Communications Conference, MILCOM 2021, San Diego, CA, USA, November 29 - Dec. 2, 2021, pp. 886-891, 2021, IEEE, 978-1-6654-3956-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Kota Chin, Kazumasa Omote |
Analysis of Attack Activities for Honeypots Installation in Ethereum Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain ![In: 2021 IEEE International Conference on Blockchain, Blockchain 2021, Melbourne, Australia, December 6-8, 2021, pp. 440-447, 2021, IEEE, 978-1-6654-1760-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Antonina Kashtalian, Oleg Savenko, Anatoliy Sachenko |
Agglomerative Clustering of Data Collected by Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDAACS ![In: 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland, September 22-25, 2021, pp. 504-509, 2021, IEEE, 978-1-6654-4209-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Danyil Zhuravchak, Taras Ustyianovych, Valery Dudykevych, Bogdan Venny, Khrystyna Ruda |
Ransomware Prevention System Design based on File Symbolic Linking Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDAACS ![In: 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland, September 22-25, 2021, pp. 284-287, 2021, IEEE, 978-1-6654-4209-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Thai Le, Noseong Park, Dongwon Lee 0001 |
A Sweet Rabbit Hole by DARCY: Using Honeypots to Detect Universal Trigger's Adversarial Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACL/IJCNLP (1) ![In: Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, ACL/IJCNLP 2021, (Volume 1: Long Papers), Virtual Event, August 1-6, 2021., pp. 3831-3844, 2021, Association for Computational Linguistics, 978-1-954085-52-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Johannes Krupp |
Using honeypots to trace back amplification DDoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
RDF |
|
19 | Weizhe Zhang, Bin Zhang 0048, Ying Zhou, Hui He, Zeyu Ding 0003 |
An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 7(5), pp. 3991-3999, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Lynda Boukela, Gongxuan Zhang, Samia Bouzefrane 0001, Junlong Zhou |
An outlier ensemble for unsupervised anomaly detection in honeypots data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intell. Data Anal. ![In: Intell. Data Anal. 24(4), pp. 743-758, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Nicholas Carlini |
A Partial Break of the Honeypots Defense to Catch Adversarial Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2009.10975, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Linan Huang, Quanyan Zhu |
Cognitive Honeypots against Lateral Movement for Mitigation of Long-Term Vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2007.13981, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Shawn Shan, Emily Wenger, Bolun Wang, Bo Li 0026, Haitao Zheng 0001, Ben Y. Zhao |
Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020, pp. 67-83, 2020, ACM, 978-1-4503-7089-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Christof Ferreira Torres, Mathis Baden, Radu State |
Towards Usable Protection Against Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICBC ![In: IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020, Toronto, ON, Canada, May 2-6, 2020, pp. 1-2, 2020, IEEE, 978-1-7281-6680-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote |
Profiling of Malicious Users Using Simple Honeypots on the Ethereum Blockchain Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICBC ![In: IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020, Toronto, ON, Canada, May 2-6, 2020, pp. 1-3, 2020, IEEE, 978-1-7281-6680-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Ramiro Camino, Christof Ferreira Torres, Mathis Baden, Radu State |
A Data Science Approach for Detecting Honeypots in Ethereum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICBC ![In: IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020, Toronto, ON, Canada, May 2-6, 2020, pp. 1-9, 2020, IEEE, 978-1-7281-6680-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | João M. Ceron, Christian Scholten, Aiko Pras, Jair Santanna |
MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020, pp. 1-9, 2020, IEEE, 978-1-7281-4973-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Linan Huang, Quanyan Zhu |
Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GameSec ![In: Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings, pp. 125-146, 2020, Springer, 978-3-030-64792-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Angelo Furfaro, Francesco Lupia, Domenico Saccà |
Gathering Malware Data through High-Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEBD ![In: Proceedings of the 28th Italian Symposium on Advanced Database Systems, Villasimius, Sud Sardegna, Italy (virtual due to Covid-19 pandemic), June 21-24, 2020., pp. 286-293, 2020, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Stefano Bistarelli, Emanuele Bosimini, Francesco Santini 0001 |
A Report on the Security of Home Connections with IoT and Docker Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITASEC ![In: Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020., pp. 60-70, 2020, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Neil C. Rowe, Thuy D. Nguyen, Marian Kendrick, Zaky Rucker, Dahae Hyun, Justin Brown |
Creating Convincing Industrial-Control-System Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui, Hawaii, USA, January 7-10, 2020, pp. 1-10, 2020, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Jafar Haadi Jafarian, Amirreza Niakanlahiji |
Delivering Honeypots as a Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui, Hawaii, USA, January 7-10, 2020, pp. 1-10, 2020, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Jonathan Schler, Elisheva Bonchek-Dokow |
Utilizing Natural Honeypots for Efficiently Labeling Astroturfer Profiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EKAW (Posters & Demos) ![In: Proceedings of the EKAW 2020 Posters and Demonstrations Session co-located with 22nd International Conference on Knowledge Engineering and Knowledge Management (EKAW 2020), Globally online & Bozen-Bolzano, Italy, September 17, 2020, pp. 41-45, 2020, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Jouni Ihanus, Tero Kokkonen |
Modelling Medical Devices with Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEW2AN/ruSMART ![In: Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 20th International Conference, NEW2AN 2020, and 13th Conference, ruSMART 2020, St. Petersburg, Russia, August 26-28, 2020, Proceedings, Part I, pp. 295-306, 2020, Springer, 978-3-030-65725-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Bryson Lingenfelter, Iman Vakilinia, Shamik Sengupta |
Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCWC ![In: 10th Annual Computing and Communication Workshop and Conference, CCWC 2020, Las Vegas, NV, USA, January 6-8, 2020, pp. 761-767, 2020, IEEE, 978-1-7281-3783-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Sergio Vidal-González, Isaías García-Rodríguez, Héctor Alaiz-Moretón, Carmen Benavides-Cuellar, José Alberto Benítez-Andrades, María Teresa García-Ordás, Paulo Novais |
Analyzing IoT-Based Botnet Malware Activity with Distributed Low Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIST (2) ![In: Trends and Innovations in Information Systems and Technologies - Volume 2, WorldCIST 2020, Budva, Montenegro, 7-10 April 2020., pp. 329-338, 2020, Springer, 978-3-030-45690-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote |
Profiling of Malicious Users Targeting Ethereum's RPC Port Using Simple Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain ![In: IEEE International Conference on Blockchain, Blockchain 2020, Rhodes, Greece, November 2-6, 2020, pp. 1-8, 2020, IEEE, 978-0-7381-0495-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Alexander Vetterl |
Honeypots in the age of universal attacks and the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
19 | Matej Zuzcak, Petr Bujok |
Causal analysis of attacks against honeypots based on properties of countries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 13(5), pp. 435-447, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Yang Li 0052, Leyi Shi, Haijie Feng |
A Game-Theoretic Analysis for Distributed Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 11(3), pp. 65, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Christof Ferreira Torres, Mathis Steichen |
The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1902.06976, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
19 | Adrian Pauna, Ion Bica, Florin Pop, Aniello Castiglione |
On the rewards of self-adaptive IoT honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 74(7-8), pp. 501-515, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Shun Morishita, Takuya Hoizumi, Wataru Ueno, Rui Tanabe, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto |
Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IM ![In: IFIP/IEEE International Symposium on Integrated Network Management, IM 2019, Washington, DC, USA, April 09-11, 2019., pp. 134-143, 2019, IFIP, 978-3-903176-15-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
19 | Christos Dalamagkas, Panagiotis G. Sarigiannidis, Dimosthenis Ioannidis, Eider Iturbe, Odysseas Nikolis, Francisco Ramos 0003, Erkuden Rios, Antonios Sarigiannidis, Dimitrios Tzovaras |
A Survey On Honeypots, Honeynets And Their Applications On Smart Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetSoft ![In: 5th IEEE Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019, pp. 93-100, 2019, IEEE, 978-1-5386-9376-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Pietro Ferretti, Marcello Pogliani, Stefano Zanero |
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019., pp. 51-61, 2019, ACM, 978-1-4503-6831-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Michael A. Haney |
Leveraging Cyber-Physical System Honeypots to Enhance Threat Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection XIII - 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11-12, 2019, Revised Selected Papers, pp. 209-233, 2019, Springer, 978-3-030-34646-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici |
Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, March 25-27, 2019, pp. 85-96, 2019, ACM, 978-1-4503-6099-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Lukás Zobal, Dusan Kolár, Radek Fujdiak |
Current State of Honeypots and Deception Strategies in Cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUMT ![In: 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, ICUMT 2019, Dublin, Ireland, October 28-30, 2019, pp. 1-9, 2019, IEEE, 978-1-7281-5764-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Mohammad-Reza Zamiri-Gourabi, Ali Razmjoo-Qalaei, Babak Amin Azad |
Gas what?: I can see your GasPots. Studying the fingerprintability of ICS honeypots in the wild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSS ![In: Proceedings of the Fifth Annual Industrial Control System Security Workshop, ICSS 2019, San Juan, PR, USA, December 10, 2019, pp. 30-37, 2019, ACM, 978-1-4503-7719-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Fadi Younis, Ali Miri |
Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS Workshops ![In: Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings, pp. 24-48, 2019, Springer, 978-3-030-29728-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Christof Ferreira Torres, Mathis Steichen, Radu State |
The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019., pp. 1591-1607, 2019, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
19 | Xupeng Luo, Qiao Yan, Mingde Wang, Wenyao Huang |
Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ComComAP ![In: Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, China, October 26-28, 2019, pp. 392-395, 2019, IEEE, 978-1-7281-1973-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Johann Bauer, Johannes Goltz, Thomas Mundt, Simeon Wiedenmann |
Honeypots for Threat Intelligence in Building Automation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ComComAP ![In: Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, China, October 26-28, 2019, pp. 242-246, 2019, IEEE, 978-1-7281-1973-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Alexander Vetterl, Richard Clayton 0001, Ian Walden |
Counting Outdated Honeypots: Legal and Useful. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy Workshops ![In: 2019 IEEE Security and Privacy Workshops, SP Workshops 2019, San Francisco, CA, USA, May 19-23, 2019, pp. 224-229, 2019, IEEE, 978-1-7281-3508-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Brij B. Gupta, Alisha Gupta |
Assessment of Honeypots: Issues, Challenges and Future Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cloud Appl. Comput. ![In: Int. J. Cloud Appl. Comput. 8(1), pp. 21-54, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Laurenz A. Cornelissen, Richard J. Barnett, Morakane A. M. Kepa, Daniel Loebenberg-Novitzkas, Jacques Jordaan |
Deploying South African Social Honeypots on Twitter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1809.06185, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
19 | Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui |
A security approach based on honeypots: Protecting Online Social network from malicious profiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1804.09988, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
19 | Tanmoy Chakraborty 0002, Sushil Jajodia, Noseong Park, Andrea Pugliese 0001, Edoardo Serra, V. S. Subrahmanian |
Hybrid adversarial defense: Merging honeypots and traditional security methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 26(5), pp. 615-645, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Tyrone S. Toland, Sebastian Kollmannsperger, J. Bernard Brewton, William B. Craft |
Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer and Network Security Essentials ![In: Computer and Network Security Essentials., pp. 189-204, 2018, Springer, 978-3-319-58423-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Mark Bilinski, Ryan Gabrys, Justin Mauger |
Optimal Placement of Honeypots for Network Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GameSec ![In: Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings, pp. 115-126, 2018, Springer, 978-3-030-01553-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Tomás Bajtos, Pavol Sokol, Terézia Mézesová |
Virtual honeypots and detection of telnet botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CECC ![In: Proceedings of the Central European Cybersecurity Conference 2018, CECC 2018, Ljubljana, Slovenia, November 15-16, 2018, pp. 2:1-2:6, 2018, ACM, 978-1-4503-6515-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Marius Musch, Martin Härterich, Martin Johns |
Towards an Automatic Generation of Low-Interaction Web Application Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 27:1-27:6, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Alexander Vetterl, Richard Clayton 0001 |
Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOOT @ USENIX Security Symposium ![In: 12th USENIX Workshop on Offensive Technologies, WOOT 2018, Baltimore, MD, USA, August 13-14, 2018., 2018, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
19 | Ryoh Akiyoshi, Daisuke Kotani, Yasuo Okabe |
Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 2, pp. 658-663, 2018, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Laurenz A. Cornelissen, Richard J. Barnett, Morakane A. M. Kepa, Daniel Loebenberg-Novitzkas, Jacques Jordaan |
Deploying South African social honeypots on Twitter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAICSIT ![In: Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT 2018, Port Elizabeth, South Africa, September 26-28, 2018, pp. 179-187, 2018, ACM, 978-1-4503-6647-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Óscar Navarro, Servilio Alonso Joan Balbastre, Stefan Beyer |
Gathering Intelligence Through Realistic Industrial Control System Honeypots - A Real-World Industrial Experience Report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers, pp. 143-153, 2018, Springer, 978-3-030-05848-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser |
Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings, pp. 255-271, 2018, Springer, 978-3-030-03637-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Nitin Naik, Paul Jenkins |
A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FUSION ![In: 21st International Conference on Information Fusion, FUSION 2018, Cambridge, UK, July 10-13, 2018, pp. 904-910, 2018, IEEE, 978-0-9964527-6-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Antonio Acien, Ana Nieto, Gerardo Fernandez, Javier López 0001 |
A Comprehensive Methodology for Deploying IoT Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings, pp. 229-243, 2018, Springer, 978-3-319-98384-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Abigail Paradise, Asaf Shabtai, Rami Puzis, Aviad Elyashar, Yuval Elovici, Mehran Roshandel, Christoph Peylo |
Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Soc. Syst. ![In: IEEE Trans. Comput. Soc. Syst. 4(3), pp. 65-79, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Pavol Sokol, Jakub Mísek, Martin Husák |
Honeypots and honeynets: issues of privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Inf. Secur. ![In: EURASIP J. Inf. Secur. 2017, pp. 4, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Juan Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici |
SIPHON: Towards Scalable High-Interaction Physical Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1701.02446, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
19 | Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha |
Honeypots for employee information security awareness and education training: A conceptual EASY training model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1706.08043, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
19 | Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Youki Kadobayashi |
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 69, pp. 155-173, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha |
Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications ![In: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp. 111-129, 2017, Elsevier, 978-0-12-805303-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Juan David Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici |
SIPHON: Towards Scalable High-Interaction Physical Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPSS@AsiaCCS ![In: Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017, pp. 57-68, 2017, ACM, 978-1-4503-4956-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Matej Zuzcak, Tomas Sochor |
Behavioral Analysis of Bot Activity in Infected Systems Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CN ![In: Computer Networks - 24th International Conference, CN 2017, Lądek Zdrój, Poland, June 20-23, 2017, Proceedings, pp. 118-133, 2017, Springer, 978-3-319-59766-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Alexander Kedrowitsch, Danfeng (Daphne) Yao, Gang Wang 0011, Kirk W. Cameron |
A First Look: Using Linux Containers for Deceptive Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig@CCS ![In: Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp. 15-22, 2017, ACM, 978-1-4503-5203-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Martin Valicek, Gregor Schramm, Martin Pirker, Sebastian Schrittwieser |
Creation and Integration of Remote High Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 50-55, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Abdeljalil Agnaou, Anas Abou El Kalam, Abdellah Ait Ouahman |
Towards a Collaborative Architecture of Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 14th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2017, Hammamet, Tunisia, October 30 - Nov. 3, 2017, pp. 1299-1305, 2017, IEEE Computer Society, 978-1-5386-3581-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Gerardo Fernandez, Ana Nieto, Javier López 0001 |
Modeling Malware-driven Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings, pp. 130-144, 2017, Springer, 978-3-319-64482-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Omar Zeyad Akif |
Secure authentication procedures based on timed passwords, honeypots, honeywords and multi-factor techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2017 |
RDF |
|
19 | Rajalakshmi Selvaraj, Venu Madhav Kuthadi, Tshilidzi Marwala |
Ant-based distributed denial of service detection technique using roaming virtual honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Commun. ![In: IET Commun. 10(8), pp. 929-935, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Stephan Lau, Johannes Klick, Stephan Arndt, Volker Roth 0002 |
POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pp. 1823-1825, 2016, ACM, 978-1-4503-4139-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Daniele Antonioli, Anand Agrawal, Nils Ole Tippenhauer |
Towards High-Interaction Virtual ICS Honeypots-in-a-Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016, pp. 13-22, 2016, ACM, 978-1-4503-4568-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|