Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Kyle Girtz, Barry E. Mullins, Mason Rice, Juan Lopez Jr. |
Practical Application Layer Emulation in Industrial Control System Honeypots. |
Critical Infrastructure Protection |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Naomi Kuze, Shu Ishikura, Takeshi Yagi, Daiki Chiba 0001, Masayuki Murata 0001 |
Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots. |
NOMS |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Emmanouil Vasilomanolakis, Shreyas Srinivasa, Carlos Garcia Cordero, Max Mühlhäuser |
Multi-stage attack detection and signature generation with ICS honeypots. |
NOMS |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Miroslaw Skrzewski |
About the Efficiency of Malware Monitoring via Server-Side Honeypots. |
CN |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Quang Duy La, Tony Q. S. Quek, Jemin Lee |
A game theoretic model for enabling honeypots in IoT networks. |
ICC |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Ariel Bar, Bracha Shapira, Lior Rokach, Moshe Unger |
Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis. |
SwSTE |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Tomas Sochor, Matej Zuzcak, Petr Bujok |
Analysis of attackers against windows emulating honeypots in various types of networks and regions. |
ICUFN |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Pavol Sokol, Veronika Kopcová |
Lessons learned from correlation of honeypots' data and spatial data. |
ECAI |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Marcus Paul Gutierrez, Christopher Kiekintveld |
Bandits for Cybersecurity: Adaptive Intrusion Detection Using Honeypots. |
AAAI Workshop: Artificial Intelligence for Cyber Security |
2016 |
DBLP BibTeX RDF |
|
19 | Younès El Bouzekri El Idrissi, Fatna Elmendili, Nisrine Maqrane |
A security approach for social networks based on honeypots. |
CIST |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Pavol Sokol, Veronika Kopcová |
Lessons Learned from Honeypots - Statistical Analysis of Logins and Passwords. |
CONFENIS |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Arthur Jicha, Mark W. Patton, Hsinchun Chen |
SCADA honeypots: An in-depth analysis of Conpot. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Jinhak Park, Jang Won Choi 0001, Jung-suk Song 0001 |
How to Design Practical Client Honeypots Based on Virtual Environment. |
AsiaJCIS |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Satomi Saito, Satoru Torii, Katsunari Yoshioka, Tsutomu Matsumoto |
Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots. |
AsiaJCIS |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Michael Winn, Mason Rice, Stephen Dunlap, Juan Lopez Jr., Barry E. Mullins |
Constructing cost-effective and targetable industrial control system honeypots for production networks. |
Int. J. Crit. Infrastructure Prot. |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Christoph Pohl, Michael Meier 0001, Hans-Joachim Hof |
Apate - A Linux Kernel Module for High Interaction Honeypots. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
19 | Hrishikesh Deshpande |
HoneyMesh: Preventing Distributed Denial of Service Attacks using Virtualized Honeypots. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
19 | Christopher Kiekintveld, Viliam Lisý, Radek Píbil |
Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Zainab Saud, M. Hasan Islam |
Towards proactive detection of advanced persistent threat (APT) attacks using honeypots. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Pavol Sokol, Maros Andrejko |
Deploying Honeypots and Honeynets: Issues of Liability. |
CN |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Tomas Sochor, Matej Zuzcak |
Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection. |
CN |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Pavol Sokol, Martin Husák, Frantiek Liptak |
Deploying Honeypots and Honeynets: Issue of Privacy. |
ARES |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Alexandru Vlad Serbanescu, Sebastian Obermeier 0001, Der-Yeuan Yu |
A Flexible Architecture for Industrial Control System Honeypots. |
SECRYPT |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Juan Luis Martin Acal, Gustavo Romero López, Pablo Palacín Gómez, Pablo García-Sánchez, Juan Julián Merelo Guervós, Pedro Ángel Castillo Valdivieso |
Cybersecurity and Honeypots: Experience in a Scientific Network Infrastructure. |
IJCCI (ECTA) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | T. Divya Sai Keerthi, Pallapa Venkataram |
AODV route maintenance using HoneyPots in MANETs. |
WorldCIS |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Pavol Sokol, Lenka Kleinova, Martin Husák |
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. |
EUROCON |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Pavol Sokol, Matej Zuzcak, Tomas Sochor |
Definition of Attack in Context of High Level Interaction Honeypots. |
CSOC (2) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Ayumu Hirata, Daisuke Miyamoto, Masaya Nakayama, Hiroshi Esaki |
INTERCEPT+: SDN Support for Live Migration-Based Honeypots. |
BADGERS@RAID |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Bertrand Sobesto |
Empirical studies based on Honeypots for Characterizing Attackers Behavior. |
|
2015 |
RDF |
|
19 | Shashikala Tapaswi, Adnan Mahboob, Ajay Shankar Shukla, Ishan Gupta, Pranshu Verma, Joydip Dhar |
Markov Chain Based Roaming Schemes for Honeypots. |
Wirel. Pers. Commun. |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq |
Paying for Likes? Understanding Facebook Like Fraud Using Honeypots. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
19 | Apostolis Zarras |
The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Tomas Sochor, Matej Zuzcak |
Study of Internet Threats and Attack Methods Using Honeypots and Honeynets. |
CN |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Ioannis Koniaris, Georgios I. Papadimitriou, Petros Nicopolitidis, Mohammad S. Obaidat |
Honeypots deployment for the analysis and visualization of malware activity and malicious connections. |
ICC |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Fatih Haltas, Erkam Uzun, Necati Siseci, Abdulkadir Posul, Bakir Emre |
An automated bot detection system through honeypots for large-scale. |
CyCon |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Dimitris Fronimos, Emmanouil Magkos, Vassilios Chrissikopoulos |
Evaluating Low Interaction Honeypots and On their Use against Advanced Persistent Threats. |
Panhellenic Conference on Informatics |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, Muhammad Zubair Shafiq |
Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots. |
Internet Measurement Conference |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Osama Hayatle, Hadi Otrok, Amr M. Youssef |
A Markov Decision Process Model for High Interaction Honeypots. |
Inf. Secur. J. A Glob. Perspect. |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Qassim Nasir, Zahraa A. Al-Mousa |
Honeypots Aiding Network Forensics: Challenges and Notions. |
J. Commun. |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Sanjeev Kumar, Rakesh Sehgal, Paramdeep Singh, Ankit Chaudhary |
Nepenthes Honeypots based Botnet Detection |
CoRR |
2013 |
DBLP BibTeX RDF |
|
19 | Michael Beham, Marius Vlad, Hans P. Reiser |
Intrusion detection and honeypots in nested virtualization environments. |
DSN |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Martin Husák, Martin Vizváry |
Reflected attacks abusing honeypots. |
CCS |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Constantin Musca, Emma Mirica, Razvan Deaconescu |
Detecting and Analyzing Zero-Day Attacks Using Honeypots. |
CSCS |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Urban Bilstrup, Magdalena Rosenberg |
A Pilot Study of Using Honeypots as Cyber Intelligence Sources. |
EISIC |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Daniel Andrew, Hongmei Chi |
An empirical study of botnets on university networks using low-interaction honeypots. |
ACM Southeast Regional Conference |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Ioannis Koniaris, Georgios I. Papadimitriou, Petros Nicopolitidis |
Analysis and visualization of SSH attacks using honeypots. |
EUROCON |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Samuel Oswald Hunter, Barry Irwin, Etienne Stalmans |
Real-time distributed malicious traffic monitoring for honeypots and network telescopes. |
ISSA |
2013 |
DBLP DOI BibTeX RDF |
|
19 | HongGeun Kim, Dongjin Kim 0001, Seong-je Cho, Moonju Park, Minkyu Park |
Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots. |
J. Inf. Sci. Eng. |
2012 |
DBLP BibTeX RDF |
|
19 | K. Munivara Prasad, A. Rama Mohan Reddy, M. Ganesh Karthik |
Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots |
CoRR |
2012 |
DBLP BibTeX RDF |
|
19 | K. Munivara Prasad, A. Rama Mohan Reddy, V. Jyothsna |
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM) Using Honeypots |
CoRR |
2012 |
DBLP BibTeX RDF |
|
19 | Tammo Krueger, Hugo Gascon, Nicole Krämer 0002, Konrad Rieck |
Learning stateful models for network honeypots. |
AISec |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Sebastian Biedermann, Martin Mink, Stefan Katzenbeisser 0001 |
Fast dynamic extracted honeypots in cloud computing. |
CCSW |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Ritu Tiwari, Abhishek Jain |
Improving network security and design using honeypots. |
CUBE |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Osama Hayatle, Hadi Otrok, Amr M. Youssef |
A game theoretic investigation for high interaction honeypots. |
ICC |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Saurabh Kulkarni, Madhumitra Mutalik, Prathamesh Kulkarni, Tarun Gupta 0003 |
Honeydoop - a system for on-demand virtual high interaction honeypots. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
19 | K. Munivara Prasad, M. Ganesh Karthik, E. S. Phalguna Krishna |
An Efficient Flash Crowd Attack Detection to Internet Threat Monitors (ITM) Using Honeypots. |
ACITY (2) |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Yi Zhou 0003, Kai Chen 0006, Li Song 0001, Xiaokang Yang, Jianhua He |
Feature Analysis of Spammers in Social Networks with Active Honeypots: A Case Study of Chinese Microblogging Networks. |
ASONAM |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata |
A distributed platform of high interaction honeypots and experimental results. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Adrian Pauna |
Improved self adaptive honeypots capable of detecting rootkit malware. |
COMM |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Yaser Alosefer |
Analysing web-based malware behaviour through client honeypots. |
|
2012 |
RDF |
|
19 | Anton Chuvakin |
Honeypots and Honeynets. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh |
Intelligent High-Interaction Web Honeypots Based on URL Conversion Scheme. |
IEICE Trans. Commun. |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Jan Göbel, Andreas Dewald |
Client-Honeypots - Exploring Malicious Websites. |
|
2011 |
RDF |
|
19 | Gérard Wagener, Radu State, Thomas Engel 0001, Alexandre Dulaunoy |
Adaptive and self-configurable honeypots. |
Integrated Network Management |
2011 |
DBLP DOI BibTeX RDF |
|
19 | John P. John, Fang Yu 0002, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi |
Heat-seeking honeypots: design and experience. |
WWW |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Will Davis III, Hongmei Chi |
Cyber threat analysis for university networks via virtual honeypots. |
ACM Southeast Regional Conference |
2011 |
DBLP DOI BibTeX RDF |
|
19 | HongGeun Kim, Dong-Jin Kim 0001, Seong-je Cho, Moonju Park, Minkyu Park |
An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots. |
RACS |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Deepa Srinivasan, Xuxian Jiang |
Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Gurdip Kaur, Meenu Khurana, Monika Sethi |
Intrusion detection system using honeypots and swarm intelligence. |
ACAI |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Gérard Wagener |
Paradigme de pot de miel adaptatif permettant d'étudier et d'évaluer le comportement et compétences des pirates informatiques. (Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour). |
|
2011 |
RDF |
|
19 | Craig Valli |
Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity. |
J. Digit. Forensics Secur. Law |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Craig Valli, Mohammed Al Lawati |
Developing VoIP Router Honeypots. |
Security and Management |
2010 |
DBLP BibTeX RDF |
|
19 | Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos, Spyros Antonatos |
A Systematic Characterization of IM Threats using Honeypots. |
NDSS |
2010 |
DBLP BibTeX RDF |
|
19 | Akihiro Shimoda, Tatsuya Mori, Shigeki Goto |
Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. |
SAINT |
2010 |
DBLP DOI BibTeX RDF |
low-interaction, unused IP address, malware, honeypot |
19 | Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh |
Enhanced attack collection scheme on high-interaction web honeypots. |
ISCC |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Xinyu Tang |
The Generation of Attack Signatures Based on Virtual Honeypots. |
PDCAT |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Shishir Kumar, Durgesh Pant |
Detection and Prevention of New and Unknown Malware using Honeypots |
CoRR |
2009 |
DBLP BibTeX RDF |
|
19 | Ram Kumar Singh, T. Ramajujam |
Intrusion Detection System Using Advanced Honeypots |
CoRR |
2009 |
DBLP BibTeX RDF |
|
19 | Oussama Allali, Matthieu Latapy, Clémence Magnien |
Measurement of eDonkey Activity with Distributed Honeypots |
CoRR |
2009 |
DBLP BibTeX RDF |
|
19 | Christian Seifert, Peter Komisarczuk, Ian Welch |
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
client honeypot, security, evaluation, intrusion detection |
19 | Shujun Li, Roland Schmitz |
A novel anti-phishing framework based on honeypots. |
eCrime |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Antonio Galante, Ary Kokos, Stefano Zanero |
BlueBat: Towards Practical Bluetooth Honeypots. |
ICC |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Spiros Antonatos |
Defending against known and unknown attacks using a network of affined honeypots |
|
2009 |
RDF |
|
19 | Niels Provos, Thorsten Holz |
Virtual Honeypots - From Botnet Tracking to Intrusion Detection. |
|
2008 |
RDF |
|
19 | Vilhelm Verendel, Dennis K. Nilsson, Ulf Larson, Erland Jonsson |
An Approach to using Honeypots in In-Vehicle Networks. |
VTC Fall |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Nirmal Dagdee, Urjita Thakar |
Intrusion Attack Pattern Analysis and Signature Extraction for Web Services Using Honeypots. |
ICETET |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Steve Webb, James Caverlee, Calton Pu |
Social Honeypots: Making Friends With A Spammer Near You. |
CEAS |
2008 |
DBLP BibTeX RDF |
|
19 | Yuji Miyake, Yoichi Muraoka |
Building Embedded Client Honeypots for Real-Time Safe Surfing. |
International Conference on Internet Computing |
2008 |
DBLP BibTeX RDF |
|
19 | Klaus Steding-Jessen |
Use of Honeypots for the Study of Spam and Phishing. |
|
2008 |
RDF |
|
19 | Cristine Hoepers |
Design and implementation of an infrastructure for honeypots and honeynets' information exchange and analysis. |
|
2008 |
RDF |
|
19 | Georgios Portokalidis, Herbert Bos |
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots. |
Comput. Networks |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette |
Empirical analysis and statistical modeling of attack processes based on honeypots |
CoRR |
2007 |
DBLP BibTeX RDF |
|
19 | Neil C. Rowe, E. John Custy, Binh T. Duong |
Defending Cyberspace with Fake Honeypots. |
J. Comput. |
2007 |
DBLP BibTeX RDF |
|
19 | Aarjav J. Trivedi, Paul Judge, Sven Krasser |
Analyzing Network and Content Characteristics of Spim Using Honeypots. |
SRUTI |
2007 |
DBLP BibTeX RDF |
|
19 | André Grégio, Rafael D. C. Santos, Antonio Montes |
Evaluation of data mining techniques for suspicious network activity classification using honeypots data. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Eric Alata, Marc Dacier, Yves Deswarte, M. Kaaâniche, K. Kortchinsky, Vincent Nicomette, Van-Hau Pham, Fabien Pouget |
Collection and analysis of attack data based on honeypots deployed on the Internet. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Theodor Richardson |
Preventing Attacks on Back-End Servers using Masquerading/Honeypots. |
SNPD |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Georgios Portokalidis, Asia Slowinska, Herbert Bos |
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. |
EuroSys |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Thorsten Holz |
Learning More About Attack Patterns With Honeypots. |
Sicherheit |
2006 |
DBLP BibTeX RDF |
|
19 | Mauro Andreolini, Alessandro Bulgarelli, Michele Colajanni, Francesca Mazzoni |
HoneySpam: Honeypots Fighting Spam at the Source. |
SRUTI |
2005 |
DBLP BibTeX RDF |
|