Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Kyle Girtz, Barry E. Mullins, Mason Rice, Juan Lopez Jr. |
Practical Application Layer Emulation in Industrial Control System Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers, pp. 83-98, 2016, 978-3-319-48736-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Naomi Kuze, Shu Ishikura, Takeshi Yagi, Daiki Chiba 0001, Masayuki Murata 0001 |
Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016, Istanbul, Turkey, April 25-29, 2016, pp. 1067-1072, 2016, IEEE, 978-1-5090-0223-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Emmanouil Vasilomanolakis, Shreyas Srinivasa, Carlos Garcia Cordero, Max Mühlhäuser |
Multi-stage attack detection and signature generation with ICS honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016, Istanbul, Turkey, April 25-29, 2016, pp. 1227-1232, 2016, IEEE, 978-1-5090-0223-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Miroslaw Skrzewski |
About the Efficiency of Malware Monitoring via Server-Side Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CN ![In: Computer Networks - 23rd International Conference, CN 2016, Brunów, Poland, June 14-17, 2016, Proceedings, pp. 132-140, 2016, Springer, 978-3-319-39206-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Quang Duy La, Tony Q. S. Quek, Jemin Lee |
A game theoretic model for enabling honeypots in IoT networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: 2016 IEEE International Conference on Communications, ICC 2016, Kuala Lumpur, Malaysia, May 22-27, 2016, pp. 1-6, 2016, IEEE, 978-1-4799-6664-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Ariel Bar, Bracha Shapira, Lior Rokach, Moshe Unger |
Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SwSTE ![In: 2016 IEEE International Conference on Software Science, Technology and Engineering, SWSTE 2016, Beer Sheva, Israel, June 23-24, 2016, pp. 28-36, 2016, IEEE, 978-1-5090-1018-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Tomas Sochor, Matej Zuzcak, Petr Bujok |
Analysis of attackers against windows emulating honeypots in various types of networks and regions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUFN ![In: Eighth International Conference on Ubiquitous and Future Networks, ICUFN 2016, Vienna, Austria, July 5-8, 2016, pp. 863-868, 2016, IEEE, 978-1-4673-9991-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Pavol Sokol, Veronika Kopcová |
Lessons learned from correlation of honeypots' data and spatial data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECAI ![In: 8th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2016, Ploiesti, Romania, June 30 - July 2, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-2047-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Marcus Paul Gutierrez, Christopher Kiekintveld |
Bandits for Cybersecurity: Adaptive Intrusion Detection Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Workshop: Artificial Intelligence for Cyber Security ![In: Artificial Intelligence for Cyber Security, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016., 2016, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
19 | Younès El Bouzekri El Idrissi, Fatna Elmendili, Nisrine Maqrane |
A security approach for social networks based on honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIST ![In: 4th IEEE International Colloquium on Information Science and Technology, CiSt 2016, Tangier, Morocco, October 24-26, 2016, pp. 638-643, 2016, IEEE, 978-1-5090-0751-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Pavol Sokol, Veronika Kopcová |
Lessons Learned from Honeypots - Statistical Analysis of Logins and Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONFENIS ![In: Research and Practical Issues of Enterprise Information Systems - 10th IFIP WG 8.9 Working Conference, CONFENIS 2016, Vienna, Austria, December 13-14, 2016, Proceedings, pp. 112-126, 2016, 978-3-319-49943-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Arthur Jicha, Mark W. Patton, Hsinchun Chen |
SCADA honeypots: An in-depth analysis of Conpot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 196-198, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Jinhak Park, Jang Won Choi 0001, Jung-suk Song 0001 |
How to Design Practical Client Honeypots Based on Virtual Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaJCIS ![In: 11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016, pp. 67-73, 2016, IEEE Computer Society, 978-1-5090-2285-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Satomi Saito, Satoru Torii, Katsunari Yoshioka, Tsutomu Matsumoto |
Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaJCIS ![In: 11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016, pp. 60-66, 2016, IEEE Computer Society, 978-1-5090-2285-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Michael Winn, Mason Rice, Stephen Dunlap, Juan Lopez Jr., Barry E. Mullins |
Constructing cost-effective and targetable industrial control system honeypots for production networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Crit. Infrastructure Prot. ![In: Int. J. Crit. Infrastructure Prot. 10, pp. 47-58, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Christoph Pohl, Michael Meier 0001, Hans-Joachim Hof |
Apate - A Linux Kernel Module for High Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1507.03117, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
19 | Hrishikesh Deshpande |
HoneyMesh: Preventing Distributed Denial of Service Attacks using Virtualized Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1508.05002, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
19 | Christopher Kiekintveld, Viliam Lisý, Radek Píbil |
Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 81-101, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Zainab Saud, M. Hasan Islam |
Towards proactive detection of advanced persistent threat (APT) attacks using honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015, pp. 154-157, 2015, ACM, 978-1-4503-3453-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Pavol Sokol, Maros Andrejko |
Deploying Honeypots and Honeynets: Issues of Liability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CN ![In: Computer Networks - 22nd International Conference, CN 2015, Brunów, Poland, June 16-19, 2015. Proceedings, pp. 92-101, 2015, Springer, 978-3-319-19418-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Tomas Sochor, Matej Zuzcak |
Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CN ![In: Computer Networks - 22nd International Conference, CN 2015, Brunów, Poland, June 16-19, 2015. Proceedings, pp. 69-81, 2015, Springer, 978-3-319-19418-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Pavol Sokol, Martin Husák, Frantiek Liptak |
Deploying Honeypots and Honeynets: Issue of Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: 10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015, pp. 397-403, 2015, IEEE Computer Society, 978-1-4673-6590-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Alexandru Vlad Serbanescu, Sebastian Obermeier 0001, Der-Yeuan Yu |
A Flexible Architecture for Industrial Control System Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015., pp. 16-26, 2015, SciTePress, 978-989-758-117-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Juan Luis Martin Acal, Gustavo Romero López, Pablo Palacín Gómez, Pablo García-Sánchez, Juan Julián Merelo Guervós, Pedro Ángel Castillo Valdivieso |
Cybersecurity and Honeypots: Experience in a Scientific Network Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCCI (ECTA) ![In: Proceedings of the 7th International Joint Conference on Computational Intelligence (IJCCI 2015) - Volume 1: ECTA, Lisbon, Portugal, November 12-14, 2015., pp. 313-318, 2015, SciTePress, 978-989-758-157-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | T. Divya Sai Keerthi, Pallapa Venkataram |
AODV route maintenance using HoneyPots in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 105-112, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Pavol Sokol, Lenka Kleinova, Martin Husák |
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCON ![In: IEEE EUROCON 2015 - International Conference on Computer as a Tool, Salamanca, Spain, September 8-11, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-8569-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Pavol Sokol, Matej Zuzcak, Tomas Sochor |
Definition of Attack in Context of High Level Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSOC (2) ![In: Software Engineering in Intelligent Systems - Proceedings of the 4th Computer Science On-line Conference 2015 (CSOC2015), Vol 3: Software Engineering in Intelligent Systems, pp. 155-164, 2015, Springer, 978-3-319-18472-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Ayumu Hirata, Daisuke Miyamoto, Masaya Nakayama, Hiroshi Esaki |
INTERCEPT+: SDN Support for Live Migration-Based Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BADGERS@RAID ![In: 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@RAID 2015, Kyoto, Japan, November 5, 2015, pp. 16-24, 2015, IEEE, 978-1-4673-8944-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Bertrand Sobesto |
Empirical studies based on Honeypots for Characterizing Attackers Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2015 |
RDF |
|
19 | Shashikala Tapaswi, Adnan Mahboob, Ajay Shankar Shukla, Ishan Gupta, Pranshu Verma, Joydip Dhar |
Markov Chain Based Roaming Schemes for Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 78(2), pp. 995-1010, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq |
Paying for Likes? Understanding Facebook Like Fraud Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1409.2097, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
19 | Apostolis Zarras |
The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2014, Rome, Italy, October 13-16, 2014, pp. 1-6, 2014, IEEE, 978-1-4799-3530-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Tomas Sochor, Matej Zuzcak |
Study of Internet Threats and Attack Methods Using Honeypots and Honeynets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CN ![In: Computer Networks - 21st International Conference, CN 2014, Brunów, Poland, June 23-27, 2014. Proceedings, pp. 118-127, 2014, Springer, 978-3-319-07940-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Ioannis Koniaris, Georgios I. Papadimitriou, Petros Nicopolitidis, Mohammad S. Obaidat |
Honeypots deployment for the analysis and visualization of malware activity and malicious connections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2014, Sydney, Australia, June 10-14, 2014, pp. 1819-1824, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Fatih Haltas, Erkam Uzun, Necati Siseci, Abdulkadir Posul, Bakir Emre |
An automated bot detection system through honeypots for large-scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyCon ![In: 6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014, pp. 255-270, 2014, IEEE, 978-9949-9544-0-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Dimitris Fronimos, Emmanouil Magkos, Vassilios Chrissikopoulos |
Evaluating Low Interaction Honeypots and On their Use against Advanced Persistent Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Panhellenic Conference on Informatics ![In: 18th Panhellenic Conference on Informatics, PCI '14, Athens, Greece, October 2-4, 2014, pp. 5:1-5:2, 2014, ACM, 978-1-4503-2897-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, Muhammad Zubair Shafiq |
Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 2014 Internet Measurement Conference, IMC 2014, Vancouver, BC, Canada, November 5-7, 2014, pp. 129-136, 2014, ACM, 978-1-4503-3213-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Osama Hayatle, Hadi Otrok, Amr M. Youssef |
A Markov Decision Process Model for High Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 22(4), pp. 159-170, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Qassim Nasir, Zahraa A. Al-Mousa |
Honeypots Aiding Network Forensics: Challenges and Notions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Commun. ![In: J. Commun. 8(11), pp. 700-707, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Sanjeev Kumar, Rakesh Sehgal, Paramdeep Singh, Ankit Chaudhary |
Nepenthes Honeypots based Botnet Detection ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1303.3071, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
19 | Michael Beham, Marius Vlad, Hans P. Reiser |
Intrusion detection and honeypots in nested virtualization environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013, pp. 1-6, 2013, IEEE Computer Society, 978-1-4673-6471-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Martin Husák, Martin Vizváry |
Reflected attacks abusing honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013, pp. 1449-1452, 2013, ACM, 978-1-4503-2477-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Constantin Musca, Emma Mirica, Razvan Deaconescu |
Detecting and Analyzing Zero-Day Attacks Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCS ![In: 19th International Conference on Control Systems and Computer Science, CSCS 2013, Bucharest, Romania, May 29-31, 2013, pp. 543-548, 2013, IEEE, 978-1-4673-6140-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Urban Bilstrup, Magdalena Rosenberg |
A Pilot Study of Using Honeypots as Cyber Intelligence Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EISIC ![In: 2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013, pp. 224, 2013, IEEE, 978-0-7695-5062-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Daniel Andrew, Hongmei Chi |
An empirical study of botnets on university networks using low-interaction honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: ACM Southeast Regional Conference 2013, ACM SE'13, Savannah, GA, USA, April 4-6, 2013, pp. 44:1-44:2, 2013, ACM, 978-1-4503-1901-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Ioannis Koniaris, Georgios I. Papadimitriou, Petros Nicopolitidis |
Analysis and visualization of SSH attacks using honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCON ![In: Proceedings of Eurocon 2013, International Conference on Computer as a Tool, Zagreb, Croatia, July 1-4, 2013, pp. 65-72, 2013, IEEE, 978-1-4673-2230-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Samuel Oswald Hunter, Barry Irwin, Etienne Stalmans |
Real-time distributed malicious traffic monitoring for honeypots and network telescopes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSA ![In: 2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013, pp. 1-9, 2013, IEEE, 978-1-4799-0808-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | HongGeun Kim, Dongjin Kim 0001, Seong-je Cho, Moonju Park, Minkyu Park |
Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 28(5), pp. 911-924, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
19 | K. Munivara Prasad, A. Rama Mohan Reddy, M. Ganesh Karthik |
Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1201.2481, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
19 | K. Munivara Prasad, A. Rama Mohan Reddy, V. Jyothsna |
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM) Using Honeypots ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1202.4530, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
19 | Tammo Krueger, Hugo Gascon, Nicole Krämer 0002, Konrad Rieck |
Learning stateful models for network honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012, pp. 37-48, 2012, ACM, 978-1-4503-1664-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Sebastian Biedermann, Martin Mink, Stefan Katzenbeisser 0001 |
Fast dynamic extracted honeypots in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCSW ![In: Proceedings of the 2012 ACM Workshop on Cloud computing security, CCSW 2012, Raleigh, NC, USA, October 19, 2012., pp. 13-18, 2012, ACM, 978-1-4503-1665-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Ritu Tiwari, Abhishek Jain |
Improving network security and design using honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CUBE ![In: CUBE International IT Conference & Exhibition, CUBE '12, Pune, India - September 03 - 06, 2012, pp. 847-852, 2012, ACM, 978-1-4503-1185-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Osama Hayatle, Hadi Otrok, Amr M. Youssef |
A game theoretic investigation for high interaction honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, June 10-15, 2012, pp. 6662-6667, 2012, IEEE, 978-1-4577-2052-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Saurabh Kulkarni, Madhumitra Mutalik, Prathamesh Kulkarni, Tarun Gupta 0003 |
Honeydoop - a system for on-demand virtual high interaction honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, December 10-12, 2012, pp. 743-747, 2012, IEEE, 978-1-4673-5325-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
19 | K. Munivara Prasad, M. Ganesh Karthik, E. S. Phalguna Krishna |
An Efficient Flash Crowd Attack Detection to Internet Threat Monitors (ITM) Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACITY (2) ![In: Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 2, pp. 595-610, 2012, Springer, 978-3-642-31551-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Yi Zhou 0003, Kai Chen 0006, Li Song 0001, Xiaokang Yang, Jianhua He |
Feature Analysis of Spammers in Social Networks with Active Honeypots: A Case Study of Chinese Microblogging Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASONAM ![In: International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2012, Istanbul, Turkey, 26-29 August 2012, pp. 728-729, 2012, IEEE Computer Society, 978-0-7695-4799-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata |
A distributed platform of high interaction honeypots and experimental results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Tenth Annual International Conference on Privacy, Security and Trust, PST 2012, Paris, France, July 16-18, 2012, pp. 229-230, 2012, IEEE Computer Society, 978-1-4673-2323-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Adrian Pauna |
Improved self adaptive honeypots capable of detecting rootkit malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMM ![In: 9th International Conference on Communications, COMM 2012, Bucharest, Romania, June 21-23, 2012, pp. 281-284, 2012, IEEE, 978-1-4577-0057-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Yaser Alosefer |
Analysing web-based malware behaviour through client honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
RDF |
|
19 | Anton Chuvakin |
Honeypots and Honeynets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh |
Intelligent High-Interaction Web Honeypots Based on URL Conversion Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Commun. ![In: IEICE Trans. Commun. 94-B(5), pp. 1339-1347, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Jan Göbel, Andreas Dewald |
Client-Honeypots - Exploring Malicious Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2011 |
RDF |
|
19 | Gérard Wagener, Radu State, Thomas Engel 0001, Alexandre Dulaunoy |
Adaptive and self-configurable honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, IM 2011, Dublin, Ireland, 23-27 May 2011, pp. 345-352, 2011, IEEE, 978-1-4244-9221-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | John P. John, Fang Yu 0002, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi |
Heat-seeking honeypots: design and experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 20th International Conference on World Wide Web, WWW 2011, Hyderabad, India, March 28 - April 1, 2011, pp. 207-216, 2011, ACM, 978-1-4503-0632-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Will Davis III, Hongmei Chi |
Cyber threat analysis for university networks via virtual honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 49th Annual Southeast Regional Conference, 2011, Kennesaw, GA, USA, March 24-26, 2011, pp. 354-355, 2011, ACM, 978-1-4503-0686-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | HongGeun Kim, Dong-Jin Kim 0001, Seong-je Cho, Moonju Park, Minkyu Park |
An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RACS ![In: Research in Applied Computation Symposium, RACS '11, Miami, FL, USA, October 19-22, 2011, pp. 266-271, 2011, ACM, 978-1-4503-1087-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Deepa Srinivasan, Xuxian Jiang |
Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers, pp. 209-226, 2011, Springer, 978-3-642-31908-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Gurdip Kaur, Meenu Khurana, Monika Sethi |
Intrusion detection system using honeypots and swarm intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACAI ![In: International Conference on Advances in Computing and Artificial Intelligence, ACAI '11, Rajpura/Punjab, India - July 21 - 22, 2011, pp. 34-38, 2011, ACM, 978-1-4503-0635-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Gérard Wagener |
Paradigme de pot de miel adaptatif permettant d'étudier et d'évaluer le comportement et compétences des pirates informatiques. (Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2011 |
RDF |
|
19 | Craig Valli |
Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Forensics Secur. Law ![In: J. Digit. Forensics Secur. Law 5(2), pp. 35-44, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Craig Valli, Mohammed Al Lawati |
Developing VoIP Router Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes, pp. 615-619, 2010, CSREA Press, 1-60132-163-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
19 | Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos, Spyros Antonatos |
A Systematic Characterization of IM Threats using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd March 2010, 2010, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
19 | Akihiro Shimoda, Tatsuya Mori, Shigeki Goto |
Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Tenth Annual International Symposium on Applications and the Internet, SAINT 2010, Seoul, Korea, 19-23 July, 2010, Proceedings, pp. 22-30, 2010, IEEE Computer Society, 978-1-4244-7526-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
low-interaction, unused IP address, malware, honeypot |
19 | Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh |
Enhanced attack collection scheme on high-interaction web honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 15th IEEE Symposium on Computers and Communications, ISCC 2010, Riccione, Italy, June 22-25, 2010, pp. 81-86, 2010, IEEE Computer Society, 978-1-4244-7755-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Xinyu Tang |
The Generation of Attack Signatures Based on Virtual Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: 2010 International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2010, Wuhan, China, 8-11 December, 2010, pp. 435-439, 2010, IEEE Computer Society, 978-0-7695-4287-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Shishir Kumar, Durgesh Pant |
Detection and Prevention of New and Unknown Malware using Honeypots ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0912.2293, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
19 | Ram Kumar Singh, T. Ramajujam |
Intrusion Detection System Using Advanced Honeypots ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0906.5031, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
19 | Oussama Allali, Matthieu Latapy, Clémence Magnien |
Measurement of eDonkey Activity with Distributed Honeypots ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0904.3215, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
19 | Christian Seifert, Peter Komisarczuk, Ian Welch |
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 63-69, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
client honeypot, security, evaluation, intrusion detection |
19 | Shujun Li, Roland Schmitz |
A novel anti-phishing framework based on honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009, pp. 1-13, 2009, IEEE, 978-1-4244-4625-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Antonio Galante, Ary Kokos, Stefano Zanero |
BlueBat: Towards Practical Bluetooth Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14-18 June 2009, pp. 1-6, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Spiros Antonatos |
Defending against known and unknown attacks using a network of affined honeypots ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2009 |
RDF |
|
19 | Niels Provos, Thorsten Holz |
Virtual Honeypots - From Botnet Tracking to Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2008 |
RDF |
|
19 | Vilhelm Verendel, Dennis K. Nilsson, Ulf Larson, Erland Jonsson |
An Approach to using Honeypots in In-Vehicle Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Fall ![In: Proceedings of the 68th IEEE Vehicular Technology Conference, VTC Fall 2008, 21-24 September 2008, Calgary, Alberta, Canada, pp. 1-5, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Nirmal Dagdee, Urjita Thakar |
Intrusion Attack Pattern Analysis and Signature Extraction for Web Services Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETET ![In: First International Conference on Emerging Trends in Engineering and Technology, ICETET '08, Nagpur, Maharashtra, India, July 16-18, 2008, pp. 1232-1237, 2008, IEEE Computer Society, 978-0-7695-3267-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Steve Webb, James Caverlee, Calton Pu |
Social Honeypots: Making Friends With A Spammer Near You. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEAS ![In: CEAS 2008 - The Fifth Conference on Email and Anti-Spam, 21-22 August 2008, Mountain View, California, USA, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
19 | Yuji Miyake, Yoichi Muraoka |
Building Embedded Client Honeypots for Real-Time Safe Surfing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Internet Computing ![In: Proceedings of the 2008 International Conference on Internet Computing, ICOMP 2008, Las Vegas, Nevada, USA, July 14-17, 2008, pp. 171-174, 2008, CSREA Press, 1-60132-073-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
19 | Klaus Steding-Jessen |
Use of Honeypots for the Study of Spam and Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2008 |
RDF |
|
19 | Cristine Hoepers |
Design and implementation of an infrastructure for honeypots and honeynets' information exchange and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2008 |
RDF |
|
19 | Georgios Portokalidis, Herbert Bos |
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 51(5), pp. 1256-1274, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette |
Empirical analysis and statistical modeling of attack processes based on honeypots ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0704.0861, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
19 | Neil C. Rowe, E. John Custy, Binh T. Duong |
Defending Cyberspace with Fake Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. ![In: J. Comput. 2(2), pp. 25-36, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
19 | Aarjav J. Trivedi, Paul Judge, Sven Krasser |
Analyzing Network and Content Characteristics of Spim Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRUTI ![In: 3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, SRUTI'07, Santa Clara, CA, USA, June 18, 2007, 2007, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
19 | André Grégio, Rafael D. C. Santos, Antonio Montes |
Evaluation of data mining techniques for suspicious network activity classification using honeypots data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 657006, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Eric Alata, Marc Dacier, Yves Deswarte, M. Kaaâniche, K. Kortchinsky, Vincent Nicomette, Van-Hau Pham, Fabien Pouget |
Collection and analysis of attack data based on honeypots deployed on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quality of Protection ![In: Quality of Protection - Security Measurements and Metrics, pp. 79-91, 2006, Springer, 978-0-387-29016-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Theodor Richardson |
Preventing Attacks on Back-End Servers using Masquerading/Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Seventh International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2006), 19-20 June 2006, Las Vegas, Nevada, USA, pp. 381-388, 2006, IEEE Computer Society, 0-7695-2611-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Georgios Portokalidis, Asia Slowinska, Herbert Bos |
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, pp. 15-27, 2006, ACM, 1-59593-322-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Thorsten Holz |
Learning More About Attack Patterns With Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sicherheit ![In: Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg, pp. 30-41, 2006, GI, 3-88579-171-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
19 | Mauro Andreolini, Alessandro Bulgarelli, Michele Colajanni, Francesca Mazzoni |
HoneySpam: Honeypots Fighting Spam at the Source. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRUTI ![In: Steps to Reducing Unwanted Traffic on the Internet Workshop, SRUTI'05, Cambridge, MA, USA, July 7, 2005, 2005, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|