The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for honeypots with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2004 (25) 2005 (15) 2006-2007 (34) 2008 (23) 2009 (16) 2010-2011 (21) 2012-2013 (24) 2014-2015 (23) 2016 (17) 2017-2018 (29) 2019 (16) 2020 (20) 2021 (17) 2022 (29) 2023 (21) 2024 (2)
Publication types (Num. hits)
article(78) book(2) incollection(5) inproceedings(238) phdthesis(9)
Venues (Conferences, Journals, ...)
CoRR(31) RAID(7) IEEE Secur. Priv.(6) CN(5) DIMVA(5) HICSS(5) ICC(5) ARES(4) CCS(4) Future Internet(4) NOMS(4) ACM Southeast Regional Confere...(3) ACSAC(3) EuroS&P Workshops(3) EuroSys(3) IEEE ICBC(3) More (+10 of total 209)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 139 occurrences of 75 keywords

Results
Found 332 publication records. Showing 332 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Kyle Girtz, Barry E. Mullins, Mason Rice, Juan Lopez Jr. Practical Application Layer Emulation in Industrial Control System Honeypots. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Naomi Kuze, Shu Ishikura, Takeshi Yagi, Daiki Chiba 0001, Masayuki Murata 0001 Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots. Search on Bibsonomy NOMS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Emmanouil Vasilomanolakis, Shreyas Srinivasa, Carlos Garcia Cordero, Max Mühlhäuser Multi-stage attack detection and signature generation with ICS honeypots. Search on Bibsonomy NOMS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Miroslaw Skrzewski About the Efficiency of Malware Monitoring via Server-Side Honeypots. Search on Bibsonomy CN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Quang Duy La, Tony Q. S. Quek, Jemin Lee A game theoretic model for enabling honeypots in IoT networks. Search on Bibsonomy ICC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Ariel Bar, Bracha Shapira, Lior Rokach, Moshe Unger Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis. Search on Bibsonomy SwSTE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Tomas Sochor, Matej Zuzcak, Petr Bujok Analysis of attackers against windows emulating honeypots in various types of networks and regions. Search on Bibsonomy ICUFN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Pavol Sokol, Veronika Kopcová Lessons learned from correlation of honeypots' data and spatial data. Search on Bibsonomy ECAI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Marcus Paul Gutierrez, Christopher Kiekintveld Bandits for Cybersecurity: Adaptive Intrusion Detection Using Honeypots. Search on Bibsonomy AAAI Workshop: Artificial Intelligence for Cyber Security The full citation details ... 2016 DBLP  BibTeX  RDF
19Younès El Bouzekri El Idrissi, Fatna Elmendili, Nisrine Maqrane A security approach for social networks based on honeypots. Search on Bibsonomy CIST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Pavol Sokol, Veronika Kopcová Lessons Learned from Honeypots - Statistical Analysis of Logins and Passwords. Search on Bibsonomy CONFENIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Arthur Jicha, Mark W. Patton, Hsinchun Chen SCADA honeypots: An in-depth analysis of Conpot. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Jinhak Park, Jang Won Choi 0001, Jung-suk Song 0001 How to Design Practical Client Honeypots Based on Virtual Environment. Search on Bibsonomy AsiaJCIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Satomi Saito, Satoru Torii, Katsunari Yoshioka, Tsutomu Matsumoto Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots. Search on Bibsonomy AsiaJCIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Michael Winn, Mason Rice, Stephen Dunlap, Juan Lopez Jr., Barry E. Mullins Constructing cost-effective and targetable industrial control system honeypots for production networks. Search on Bibsonomy Int. J. Crit. Infrastructure Prot. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Christoph Pohl, Michael Meier 0001, Hans-Joachim Hof Apate - A Linux Kernel Module for High Interaction Honeypots. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
19Hrishikesh Deshpande HoneyMesh: Preventing Distributed Denial of Service Attacks using Virtualized Honeypots. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
19Christopher Kiekintveld, Viliam Lisý, Radek Píbil Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Zainab Saud, M. Hasan Islam Towards proactive detection of advanced persistent threat (APT) attacks using honeypots. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Pavol Sokol, Maros Andrejko Deploying Honeypots and Honeynets: Issues of Liability. Search on Bibsonomy CN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Tomas Sochor, Matej Zuzcak Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection. Search on Bibsonomy CN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Pavol Sokol, Martin Husák, Frantiek Liptak Deploying Honeypots and Honeynets: Issue of Privacy. Search on Bibsonomy ARES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Alexandru Vlad Serbanescu, Sebastian Obermeier 0001, Der-Yeuan Yu A Flexible Architecture for Industrial Control System Honeypots. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Juan Luis Martin Acal, Gustavo Romero López, Pablo Palacín Gómez, Pablo García-Sánchez, Juan Julián Merelo Guervós, Pedro Ángel Castillo Valdivieso Cybersecurity and Honeypots: Experience in a Scientific Network Infrastructure. Search on Bibsonomy IJCCI (ECTA) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19T. Divya Sai Keerthi, Pallapa Venkataram AODV route maintenance using HoneyPots in MANETs. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Pavol Sokol, Lenka Kleinova, Martin Husák Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. Search on Bibsonomy EUROCON The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Pavol Sokol, Matej Zuzcak, Tomas Sochor Definition of Attack in Context of High Level Interaction Honeypots. Search on Bibsonomy CSOC (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Ayumu Hirata, Daisuke Miyamoto, Masaya Nakayama, Hiroshi Esaki INTERCEPT+: SDN Support for Live Migration-Based Honeypots. Search on Bibsonomy BADGERS@RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Bertrand Sobesto Empirical studies based on Honeypots for Characterizing Attackers Behavior. Search on Bibsonomy 2015   RDF
19Shashikala Tapaswi, Adnan Mahboob, Ajay Shankar Shukla, Ishan Gupta, Pranshu Verma, Joydip Dhar Markov Chain Based Roaming Schemes for Honeypots. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq Paying for Likes? Understanding Facebook Like Fraud Using Honeypots. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
19Apostolis Zarras The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security. Search on Bibsonomy ICCST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Tomas Sochor, Matej Zuzcak Study of Internet Threats and Attack Methods Using Honeypots and Honeynets. Search on Bibsonomy CN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Ioannis Koniaris, Georgios I. Papadimitriou, Petros Nicopolitidis, Mohammad S. Obaidat Honeypots deployment for the analysis and visualization of malware activity and malicious connections. Search on Bibsonomy ICC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Fatih Haltas, Erkam Uzun, Necati Siseci, Abdulkadir Posul, Bakir Emre An automated bot detection system through honeypots for large-scale. Search on Bibsonomy CyCon The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Dimitris Fronimos, Emmanouil Magkos, Vassilios Chrissikopoulos Evaluating Low Interaction Honeypots and On their Use against Advanced Persistent Threats. Search on Bibsonomy Panhellenic Conference on Informatics The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, Muhammad Zubair Shafiq Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Osama Hayatle, Hadi Otrok, Amr M. Youssef A Markov Decision Process Model for High Interaction Honeypots. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Qassim Nasir, Zahraa A. Al-Mousa Honeypots Aiding Network Forensics: Challenges and Notions. Search on Bibsonomy J. Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Sanjeev Kumar, Rakesh Sehgal, Paramdeep Singh, Ankit Chaudhary Nepenthes Honeypots based Botnet Detection Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
19Michael Beham, Marius Vlad, Hans P. Reiser Intrusion detection and honeypots in nested virtualization environments. Search on Bibsonomy DSN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Martin Husák, Martin Vizváry Reflected attacks abusing honeypots. Search on Bibsonomy CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Constantin Musca, Emma Mirica, Razvan Deaconescu Detecting and Analyzing Zero-Day Attacks Using Honeypots. Search on Bibsonomy CSCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Urban Bilstrup, Magdalena Rosenberg A Pilot Study of Using Honeypots as Cyber Intelligence Sources. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Daniel Andrew, Hongmei Chi An empirical study of botnets on university networks using low-interaction honeypots. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Ioannis Koniaris, Georgios I. Papadimitriou, Petros Nicopolitidis Analysis and visualization of SSH attacks using honeypots. Search on Bibsonomy EUROCON The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Samuel Oswald Hunter, Barry Irwin, Etienne Stalmans Real-time distributed malicious traffic monitoring for honeypots and network telescopes. Search on Bibsonomy ISSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19HongGeun Kim, Dongjin Kim 0001, Seong-je Cho, Moonju Park, Minkyu Park Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2012 DBLP  BibTeX  RDF
19K. Munivara Prasad, A. Rama Mohan Reddy, M. Ganesh Karthik Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
19K. Munivara Prasad, A. Rama Mohan Reddy, V. Jyothsna IP Traceback for Flooding attacks on Internet Threat Monitors (ITM) Using Honeypots Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
19Tammo Krueger, Hugo Gascon, Nicole Krämer 0002, Konrad Rieck Learning stateful models for network honeypots. Search on Bibsonomy AISec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Sebastian Biedermann, Martin Mink, Stefan Katzenbeisser 0001 Fast dynamic extracted honeypots in cloud computing. Search on Bibsonomy CCSW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Ritu Tiwari, Abhishek Jain Improving network security and design using honeypots. Search on Bibsonomy CUBE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Osama Hayatle, Hadi Otrok, Amr M. Youssef A game theoretic investigation for high interaction honeypots. Search on Bibsonomy ICC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Saurabh Kulkarni, Madhumitra Mutalik, Prathamesh Kulkarni, Tarun Gupta 0003 Honeydoop - a system for on-demand virtual high interaction honeypots. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
19K. Munivara Prasad, M. Ganesh Karthik, E. S. Phalguna Krishna An Efficient Flash Crowd Attack Detection to Internet Threat Monitors (ITM) Using Honeypots. Search on Bibsonomy ACITY (2) The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Yi Zhou 0003, Kai Chen 0006, Li Song 0001, Xiaokang Yang, Jianhua He Feature Analysis of Spammers in Social Networks with Active Honeypots: A Case Study of Chinese Microblogging Networks. Search on Bibsonomy ASONAM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata A distributed platform of high interaction honeypots and experimental results. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Adrian Pauna Improved self adaptive honeypots capable of detecting rootkit malware. Search on Bibsonomy COMM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Yaser Alosefer Analysing web-based malware behaviour through client honeypots. Search on Bibsonomy 2012   RDF
19Anton Chuvakin Honeypots and Honeynets. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh Intelligent High-Interaction Web Honeypots Based on URL Conversion Scheme. Search on Bibsonomy IEICE Trans. Commun. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Jan Göbel, Andreas Dewald Client-Honeypots - Exploring Malicious Websites. Search on Bibsonomy 2011   RDF
19Gérard Wagener, Radu State, Thomas Engel 0001, Alexandre Dulaunoy Adaptive and self-configurable honeypots. Search on Bibsonomy Integrated Network Management The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19John P. John, Fang Yu 0002, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi Heat-seeking honeypots: design and experience. Search on Bibsonomy WWW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Will Davis III, Hongmei Chi Cyber threat analysis for university networks via virtual honeypots. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19HongGeun Kim, Dong-Jin Kim 0001, Seong-je Cho, Moonju Park, Minkyu Park An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots. Search on Bibsonomy RACS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Deepa Srinivasan, Xuxian Jiang Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Gurdip Kaur, Meenu Khurana, Monika Sethi Intrusion detection system using honeypots and swarm intelligence. Search on Bibsonomy ACAI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Gérard Wagener Paradigme de pot de miel adaptatif permettant d'étudier et d'évaluer le comportement et compétences des pirates informatiques. (Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour). Search on Bibsonomy 2011   RDF
19Craig Valli Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity. Search on Bibsonomy J. Digit. Forensics Secur. Law The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Craig Valli, Mohammed Al Lawati Developing VoIP Router Honeypots. Search on Bibsonomy Security and Management The full citation details ... 2010 DBLP  BibTeX  RDF
19Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos, Spyros Antonatos A Systematic Characterization of IM Threats using Honeypots. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
19Akihiro Shimoda, Tatsuya Mori, Shigeki Goto Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. Search on Bibsonomy SAINT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF low-interaction, unused IP address, malware, honeypot
19Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh Enhanced attack collection scheme on high-interaction web honeypots. Search on Bibsonomy ISCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Xinyu Tang The Generation of Attack Signatures Based on Virtual Honeypots. Search on Bibsonomy PDCAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Shishir Kumar, Durgesh Pant Detection and Prevention of New and Unknown Malware using Honeypots Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
19Ram Kumar Singh, T. Ramajujam Intrusion Detection System Using Advanced Honeypots Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
19Oussama Allali, Matthieu Latapy, Clémence Magnien Measurement of eDonkey Activity with Distributed Honeypots Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
19Christian Seifert, Peter Komisarczuk, Ian Welch True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF client honeypot, security, evaluation, intrusion detection
19Shujun Li, Roland Schmitz A novel anti-phishing framework based on honeypots. Search on Bibsonomy eCrime The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Antonio Galante, Ary Kokos, Stefano Zanero BlueBat: Towards Practical Bluetooth Honeypots. Search on Bibsonomy ICC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Spiros Antonatos Defending against known and unknown attacks using a network of affined honeypots Search on Bibsonomy 2009   RDF
19Niels Provos, Thorsten Holz Virtual Honeypots - From Botnet Tracking to Intrusion Detection. Search on Bibsonomy 2008   RDF
19Vilhelm Verendel, Dennis K. Nilsson, Ulf Larson, Erland Jonsson An Approach to using Honeypots in In-Vehicle Networks. Search on Bibsonomy VTC Fall The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Nirmal Dagdee, Urjita Thakar Intrusion Attack Pattern Analysis and Signature Extraction for Web Services Using Honeypots. Search on Bibsonomy ICETET The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Steve Webb, James Caverlee, Calton Pu Social Honeypots: Making Friends With A Spammer Near You. Search on Bibsonomy CEAS The full citation details ... 2008 DBLP  BibTeX  RDF
19Yuji Miyake, Yoichi Muraoka Building Embedded Client Honeypots for Real-Time Safe Surfing. Search on Bibsonomy International Conference on Internet Computing The full citation details ... 2008 DBLP  BibTeX  RDF
19Klaus Steding-Jessen Use of Honeypots for the Study of Spam and Phishing. Search on Bibsonomy 2008   RDF
19Cristine Hoepers Design and implementation of an infrastructure for honeypots and honeynets' information exchange and analysis. Search on Bibsonomy 2008   RDF
19Georgios Portokalidis, Herbert Bos SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots. Search on Bibsonomy Comput. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette Empirical analysis and statistical modeling of attack processes based on honeypots Search on Bibsonomy CoRR The full citation details ... 2007 DBLP  BibTeX  RDF
19Neil C. Rowe, E. John Custy, Binh T. Duong Defending Cyberspace with Fake Honeypots. Search on Bibsonomy J. Comput. The full citation details ... 2007 DBLP  BibTeX  RDF
19Aarjav J. Trivedi, Paul Judge, Sven Krasser Analyzing Network and Content Characteristics of Spim Using Honeypots. Search on Bibsonomy SRUTI The full citation details ... 2007 DBLP  BibTeX  RDF
19André Grégio, Rafael D. C. Santos, Antonio Montes Evaluation of data mining techniques for suspicious network activity classification using honeypots data. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Eric Alata, Marc Dacier, Yves Deswarte, M. Kaaâniche, K. Kortchinsky, Vincent Nicomette, Van-Hau Pham, Fabien Pouget Collection and analysis of attack data based on honeypots deployed on the Internet. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Theodor Richardson Preventing Attacks on Back-End Servers using Masquerading/Honeypots. Search on Bibsonomy SNPD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Georgios Portokalidis, Asia Slowinska, Herbert Bos Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. Search on Bibsonomy EuroSys The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Thorsten Holz Learning More About Attack Patterns With Honeypots. Search on Bibsonomy Sicherheit The full citation details ... 2006 DBLP  BibTeX  RDF
19Mauro Andreolini, Alessandro Bulgarelli, Michele Colajanni, Francesca Mazzoni HoneySpam: Honeypots Fighting Spam at the Source. Search on Bibsonomy SRUTI The full citation details ... 2005 DBLP  BibTeX  RDF
Displaying result #201 - #300 of 332 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license