The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Honeypot with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2004 (29) 2005-2006 (34) 2007 (22) 2008 (21) 2009 (26) 2010 (20) 2011-2012 (33) 2013 (16) 2014-2015 (31) 2016 (25) 2017 (24) 2018 (34) 2019 (45) 2020 (32) 2021 (51) 2022 (33) 2023 (56) 2024 (9)
Publication types (Num. hits)
article(178) book(1) incollection(1) inproceedings(356) phdthesis(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 140 occurrences of 68 keywords

Results
Found 541 publication records. Showing 541 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Jianzhou You, Shichao Lv, Yichen Hao, Xuan Feng, Ming Zhou, Limin Sun Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Jeremiah Onaolapo Honeypot boulevard: understanding malicious activity via decoy accounts. Search on Bibsonomy 2019   RDF
17Muhammet Baykara, Resul Das A novel honeypot based security approach for real-time intrusion detection and prevention systems. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Sparsh Sharma, Ajay Kaul A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud. Search on Bibsonomy Veh. Commun. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17T. Divya Sai Keerthi, Pallapa Venkataram Honeypot Based Black-Hole Attack Confirmation in a MANET - Black-Hole Attack Confirmation. Search on Bibsonomy Int. J. Wirel. Inf. Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Gulshan Kumar, Rahul Saha, Mandeep Singh, Mritunjay Kumar Rai Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Neil Eliot, David Kendall, Michael J. Brockway A Flexible Laboratory Environment Supporting Honeypot Deployment for Teaching Real-World Cybersecurity Skills. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Ömer Erdem, Abdurrahman Pektas, Mehmet Kara HoneyThing: A New Honeypot Design for CPE Devices. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Leyi Shi, Yang Li 0052, Haijie Feng Performance Analysis of Honeypot with Petri Nets. Search on Bibsonomy Inf. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Wenjun Fan, Zhihui Du, David Fernández 0002, Víctor A. Villagrá Enabling an Anatomic View to Investigate Honeypot Systems: A Survey. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya U-PoT: A Honeypot Framework for UPnP-Based IoT Devices. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
17Meng Wang, Javier Santillan, Fernando Kuipers ThingPot: an interactive Internet-of-Things honeypot. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
17Michael F. Thompson Effects of a Honeypot on the Cyber Grand Challenge Final Event. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17T. Divya Sai Keerthi, Pallapa Venkataram Confirmation of wormhole attack in MANETs using honeypot. Search on Bibsonomy Comput. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Celine Irvene, David Formby, Samuel Litchfield, Raheem A. Beyah HoneyBot: A Honeypot for Robotic Systems. Search on Bibsonomy Proc. IEEE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Chee Keong Ng, Lei Pan 0002, Yang Xiang 0001 Honeypot Frameworks and their Applications: A New Framework Search on Bibsonomy 2018   DOI  RDF
17Seamus Dowling, Michael Schukat, Enda Barrett Using Reinforcement Learning to Conceal Honeypot Functionality. Search on Bibsonomy ECML/PKDD (3) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Daniel Fraunholz, Daniel Krohmer, Hans Dieter Schotten, Carolina Nogueira Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Michail Tsikerdekis, Sherali Zeadally, Amy Schlesener, Nicolas Sklavos 0001 Approaches for Preventing Honeypot Detection and Compromise. Search on Bibsonomy GIIS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Andronikos Kyriakou, Nicolas Sklavos 0001 Container-Based Honeypot Deployment for the Analysis of Malicious Activity. Search on Bibsonomy GIIS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Zhaopeng Jia, Xiang Cui, Qixu Liu, Xiaoxi Wang, Chaoge Liu Micro-Honeypot: Using Browser Fingerprinting to Track Attackers. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Chenpeng Ding, Jiangtao Zhai, Yuewei Dai An Improved ICS Honeypot Based on SNAP7 and IMUNES. Search on Bibsonomy ICCCS (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Jonas Müller, Christoph Anneser, Malte Sandstede, Lea Rieger, Adnan Alhomssi, Felix Schwarzmeier, Björn Bittner, Ilhan Aslan, Elisabeth André Honeypot: A Socializing App to Promote Train Commuters' Wellbeing. Search on Bibsonomy MUM The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Jörg Daubert, Dhanasekar Boopalan, Max Mühlhäuser, Emmanouil Vasilomanolakis HoneyDrone: A medium-interaction unmanned aerial vehicle honeypot. Search on Bibsonomy NOMS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Emmanouil Vasilomanolakis, Jörg Daubert, Dhanasekar Boopalan, Max Mühlhäuser Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot. Search on Bibsonomy NOMS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Alejandro Carrasco, Jorge Ropero, Paulino Ruiz-de-Clavijo, Jaime Benjumea, Amalia Luque A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot. Search on Bibsonomy QRS Companion The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Nitin Naik, Changjing Shang, Qiang Shen 0001, Paul Jenkins Intelligent Dynamic Honeypot Enabled by Dynamic Fuzzy Rule Interpolation. Search on Bibsonomy HPCC/SmartCity/DSS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya U-PoT: A Honeypot Framework for UPnP-Based IoT Devices. Search on Bibsonomy IPCCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Lionel Metongnon, Ramin Sadre Beyond Telnet: Prevalence of IoT Protocols in Telescope and Honeypot Measurements. Search on Bibsonomy WTMC@SIGCOMM The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Marius Lihet, Vasile Dadarlat Honeypot in the cloud Five years of data analysis. Search on Bibsonomy RoEduNet The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Dubravko Sever, Tonimir Kisasondi Efficiency and security of docker based honeypot systems. Search on Bibsonomy MIPRO The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Ionut Cernica, Nirvana Popescu Wordpress Honeypot Module. Search on Bibsonomy EUC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Hamad Al-Mohannadi, Irfan Awan, Jassim Al Hamar, Andrea J. Cullen, Jules Pagna Disso, Lorna Armitage Cyber Threat Intelligence from Honeypot Data Using Elasticsearch. Search on Bibsonomy AINA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Nitin Naik, Paul Jenkins, Nick Savage 0001 Threat-Aware Honeypot for Discovering and Predicting Fingerprinting Attacks Using Principal Components Analysis. Search on Bibsonomy SSCI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Nitin Naik, Changjing Shang, Qiang Shen 0001, Paul Jenkins Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation. Search on Bibsonomy SSCI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17H. Hakan Kilinc, Omer Faruk Acar Analysis of attack and attackers on VoIP Honeypot environment. Search on Bibsonomy SIU The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Eva Chovancová, Norbert Ádám, Anton Baláz, Emília Pietriková, Peter Fecilak, Slavomír Simonák, Martin Chovanec Securing Distributed Computer Systems Using an Advanced Sophisticated Hybrid Honeypot Technology. Search on Bibsonomy Comput. Informatics The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Neha Agrawal, Shashikala Tapaswi The Performance Analysis of Honeypot Based Intrusion Detection System for Wireless Network. Search on Bibsonomy Int. J. Wirel. Inf. Networks The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17L. Sivakamy, S. Pradheepkumar, Sivabalan Arumugam, Anand R. Prasad Real-Time Attack Monitoring on Telecom Network Using Open-Source Darknet and Honeypot Setup. Search on Bibsonomy J. ICT Stand. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón, Hans Dieter Schotten YAAS - On the Attribution of Honeypot Data. Search on Bibsonomy Int. J. Cyber Situational Aware. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Saurabh Chamotra, Rakesh Kumar Sehgal, Ram Swaroop Misra Honeypot Baselining for Zero Day Attack Detection. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Kun Wang 0005, Miao Du, Sabita Maharjan, Yanfei Sun Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Wenjun Fan, Zhihui Du, David Fernández 0002, Víctor A. Villagrá Enabling an Anatomic View to Investigate Honeypot Systems: A Survey. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
17Jana Medková, Martin Husák, Martin Vizváry, Pavel Celeda Honeypot testbed for network defence strategy evaluation. Search on Bibsonomy IM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Wenjun Fan, David Fernández 0002 A novel SDN based stealthy TCP connection handover mechanism for hybrid honeypot systems. Search on Bibsonomy NetSoft The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón, Hans Dieter Schotten Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Htein Lin, Stephen Dunlap, Mason Rice, Barry E. Mullins Generating Honeypot Traffic for Industrial Control Systems. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Daniel Fraunholz, Marc Zimmermann, Alexander Hafner, Hans D. Schotten Data Mining in Long-Term Honeypot Data. Search on Bibsonomy ICDM Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Yan Zhang, Chong Di, Zhuoran Han, Yichen Li, Shenghong Li 0001 An Adaptive Honeypot Deployment Algorithm Based on Learning Automata. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Miao Du, Yongzhong Li, Qing Lu, Kun Wang 0005 Bayesian Game Based Pseudo Honeypot Model in Social Networks. Search on Bibsonomy ICCCS (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Seamus Dowling, Michael Schukat, Hugh Melvin Using analysis of temporal variances within a honeypot dataset to better predict attack type probability. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Jarko Papalitsas, Sampsa Rauti, Ville Leppänen A Comparison of Record and Play Honeypot Designs. Search on Bibsonomy CompSysTech The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Jianhong Cao, Wei Li, Jianjun Li, Bo Li 0005 DiPot: A Distributed Industrial Honeypot System. Search on Bibsonomy SmartCom The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Stipe Kuman, Stjepan Gros, Miljenko Mikuc An experiment in using IMUNES and Conpot to emulate honeypot control networks. Search on Bibsonomy MIPRO The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Marcus Paul Gutierrez, Christopher Kiekintveld Adapting Honeypot Configurations to Detect Evolving Exploits. Search on Bibsonomy AAAI Workshops The full citation details ... 2017 DBLP  BibTeX  RDF
17Joni Uitto, Sampsa Rauti, Samuel Laurén, Ville Leppänen A Survey on Anti-honeypot and Anti-introspection Methods. Search on Bibsonomy WorldCIST (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser Virtual Machine Introspection Based SSH Honeypot. Search on Bibsonomy SHCIS@DAIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Feng Xiao, Enhong Chen, Qiang Xu S7commTrace: A High Interactive Honeypot for Industrial Control System Based on S7 Protocol. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Marcus Gutierrez, Christopher Kiekintveld Adapting with Honeypot Configurations to Detect Evolving Exploits. Search on Bibsonomy AAMAS The full citation details ... 2017 DBLP  BibTeX  RDF
17H. Hakan Kilinc, Ugur Cagal Detecting VoIP fuzzing attacks by using a honeypot system. Search on Bibsonomy SIU The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Samuel Litchfield, David Formby, Jonathan D. Rogers, A. P. Sakis Meliopoulos, Raheem A. Beyah Rethinking the Honeypot for Cyber-Physical Systems. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Ci-Bin Jiang, I-Hsien Liu, Yao-Nien Chung, Jung-Shian Li Novel intrusion prediction mechanism based on honeypot log similarity. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow IoTPOT: A Novel Honeypot for Revealing Current IoT Threats. Search on Bibsonomy J. Inf. Process. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Quang Duy La, Tony Q. S. Quek, Jemin Lee, Shi Jin 0002, Hongbo Zhu 0002 Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17M. Rajesh Babu, G. Usha A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Marcin Nawrocki, Matthias Wählisch, Thomas C. Schmidt, Christian Keil, Jochen Schönfelder A Survey on Honeypot Software and Data Analysis. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
17Abdeljalil Agnaou, Anas Abou El Kalam, Abdellah Ait Ouahman, Mina De Montfort Reduce positive and negative falses from attacks collected from the deployment of distributed honeypot network. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
17Zhenxin Zhan, Maochao Xu, Shouhuai Xu Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
17Dileep Basam, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities. Search on Bibsonomy J. Electr. Comput. Eng. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Hyung-Jin Mun, Kun-Hee Han Blackhole attack: user identity and password seize attack using honeypot. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Tomas Sochor, Matej Zuzcak High-Interaction Linux Honeypot Architecture in Recent Perspective. Search on Bibsonomy CN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Michal Buda, Ilona Bluemke Data Mining Algorithms in the Analysis of Security Logs from a Honeypot System. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Saurabh Chamotra, Rakesh Kumar Sehgal, Sanjeev Ror, Bhupendra Singh Honeypot Deployment in Broadband Networks. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Ruxandra Trandafir, Mihai Carabas, Razvan Rughinis, Nicolae Tapus HoneYDSPK: Cisco onePK implementation for anomaly-based IDS and honeypot services. Search on Bibsonomy RoEduNet The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Mathias Wegerer, Simon Tjoa Defeating the Database Adversary Using Deception - A MySQL Database Honeypot. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Niels Wouters, John Downs, Mitchell Harrop, Travis Cox, Eduardo Araujo Oliveira, Sarah Webber, Frank Vetere, Andrew Vande Moere Uncovering the Honeypot Effect: How Audiences Engage with Public Interactive Systems. Search on Bibsonomy Conference on Designing Interactive Systems The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Ariel Bar, Bracha Shapira, Lior Rokach, Moshe Unger Scalable attack propagation model and algorithms for honeypot systems. Search on Bibsonomy IEEE BigData The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Otto Hrad, Simo Kemppainen Honeypot utilization for analyzing cyber attacks. Search on Bibsonomy ECSA Workshops The full citation details ... 2016 DBLP  BibTeX  RDF
17Samuel Laurén, Sampsa Rauti, Ville Leppänen An interface diversified honeypot for malware analysis. Search on Bibsonomy ECSA Workshops The full citation details ... 2016 DBLP  BibTeX  RDF
17Michele Bombardieri, Salvatore Castanò, Fabrizio Curcio, Angelo Furfaro, Helen D. Karatza Honeypot-Powered Malware Reverse Engineering. Search on Bibsonomy IC2E Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Chris Moore 0001 Detecting Ransomware with Honeypot Techniques. Search on Bibsonomy CCC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Amos O. Olagunju, Farouk Samu In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention. Search on Bibsonomy RIIT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17A. M. Leonard, Hang Cai, Krishna K. Venkatasubramanian, M. Ali, Thomas Eisenbarth 0001 A honeypot system for wearable networks. Search on Bibsonomy Sarnoff Symposium The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Sven Schindler Honeypot architectures for IPv6 networks. Search on Bibsonomy 2016   RDF
17Nilesh Chakraborty, Samrat Mondal HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attack. Search on Bibsonomy Int. J. Trust. Manag. Comput. Commun. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Weizhe Zhang, Hui He, Tai-Hoon Kim Xen-based virtual honeypot system for smart device. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Mitsuaki Akiyama, Takeshi Yagi, Youki Kadobayashi, Takeo Hariu, Suguru Yamaguchi Client Honeypot Multiplication with High Performance and Precise Detection. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Michele Bombardieri, Salvatore Castanò, Fabrizio Curcio, Angelo Furfaro Honeypot-powered Malware Reverse Engineering. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
17Chun-Yi Wang, Ya-Lyue Jhao, Chuan-Sheng Wang, Shih-Jen Chen, Fu-Hau Hsu, Yao-Hsin Chen The bilateral communication-based dynamic extensible honeypot. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17M. Solomon Zemene, P. S. Avadhani Implementing high interaction honeypot to study SSH attacks. Search on Bibsonomy ICACCI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Philippe Owezarski A Near Real-Time Algorithm for Autonomous Identification and Characterization of Honeypot Attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Chris Moore 0001, Ameer Al-Nemrat An Analysis of Honeypot Programs and the Attack Data Collected. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Emmanouil Vasilomanolakis, Shankar Karuppayah, Panayotis Kikiras, Max Mühlhäuser A honeypot-driven cyber incident monitor: lessons learned and steps ahead. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Christoph Pohl, Alf Zugenmaier, Michael Meier 0001, Hans-Joachim Hof B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Emmanouil Vasilomanolakis, Shreyas Srinivasa, Max Mühlhäuser Did you really hack a nuclear power plant? An industrial control mobile honeypot. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Ronald M. Campbell, Keshnee Padayachee, Themba Masombuka A survey of honeypot research: Trends and opportunities. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Marius Alin Lihet, Vasile Dadarlat How to build a honeypot System in the cloud. Search on Bibsonomy RoEduNet The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17K. Harald Gjermundrød, Ioanna Dionysiou CloudHoneyCY - An Integrated Honeypot Framework for Cloud Infrastructures. Search on Bibsonomy UCC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Luigi Catuogno, Aniello Castiglione, Francesco Palmieri 0002 A honeypot system with honeyword-driven fake interactive sessions. Search on Bibsonomy HPCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Andreas Christoforou, K. Harald Gjermundrød, Ioanna Dionysiou HoneyCY: a configurable unified management framework for open-source honeypot services. Search on Bibsonomy Panhellenic Conference on Informatics The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 541 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license