Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Jianzhou You, Shichao Lv, Yichen Hao, Xuan Feng, Ming Zhou, Limin Sun |
Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data. |
ICICS |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Jeremiah Onaolapo |
Honeypot boulevard: understanding malicious activity via decoy accounts. |
|
2019 |
RDF |
|
17 | Muhammet Baykara, Resul Das |
A novel honeypot based security approach for real-time intrusion detection and prevention systems. |
J. Inf. Secur. Appl. |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Sparsh Sharma, Ajay Kaul |
A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud. |
Veh. Commun. |
2018 |
DBLP DOI BibTeX RDF |
|
17 | T. Divya Sai Keerthi, Pallapa Venkataram |
Honeypot Based Black-Hole Attack Confirmation in a MANET - Black-Hole Attack Confirmation. |
Int. J. Wirel. Inf. Networks |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Gulshan Kumar, Rahul Saha, Mandeep Singh, Mritunjay Kumar Rai |
Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN. |
Int. J. Inf. Secur. Priv. |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Neil Eliot, David Kendall, Michael J. Brockway |
A Flexible Laboratory Environment Supporting Honeypot Deployment for Teaching Real-World Cybersecurity Skills. |
IEEE Access |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Ömer Erdem, Abdurrahman Pektas, Mehmet Kara |
HoneyThing: A New Honeypot Design for CPE Devices. |
KSII Trans. Internet Inf. Syst. |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Leyi Shi, Yang Li 0052, Haijie Feng |
Performance Analysis of Honeypot with Petri Nets. |
Inf. |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Wenjun Fan, Zhihui Du, David Fernández 0002, Víctor A. Villagrá |
Enabling an Anatomic View to Investigate Honeypot Systems: A Survey. |
IEEE Syst. J. |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya |
U-PoT: A Honeypot Framework for UPnP-Based IoT Devices. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
17 | Meng Wang, Javier Santillan, Fernando Kuipers |
ThingPot: an interactive Internet-of-Things honeypot. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
17 | Michael F. Thompson |
Effects of a Honeypot on the Cyber Grand Challenge Final Event. |
IEEE Secur. Priv. |
2018 |
DBLP DOI BibTeX RDF |
|
17 | T. Divya Sai Keerthi, Pallapa Venkataram |
Confirmation of wormhole attack in MANETs using honeypot. |
Comput. Secur. |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Celine Irvene, David Formby, Samuel Litchfield, Raheem A. Beyah |
HoneyBot: A Honeypot for Robotic Systems. |
Proc. IEEE |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Chee Keong Ng, Lei Pan 0002, Yang Xiang 0001 |
Honeypot Frameworks and their Applications: A New Framework |
|
2018 |
DOI RDF |
|
17 | Seamus Dowling, Michael Schukat, Enda Barrett |
Using Reinforcement Learning to Conceal Honeypot Functionality. |
ECML/PKDD (3) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Daniel Fraunholz, Daniel Krohmer, Hans Dieter Schotten, Carolina Nogueira |
Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications. |
Cyber Security |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Michail Tsikerdekis, Sherali Zeadally, Amy Schlesener, Nicolas Sklavos 0001 |
Approaches for Preventing Honeypot Detection and Compromise. |
GIIS |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Andronikos Kyriakou, Nicolas Sklavos 0001 |
Container-Based Honeypot Deployment for the Analysis of Malicious Activity. |
GIIS |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Zhaopeng Jia, Xiang Cui, Qixu Liu, Xiaoxi Wang, Chaoge Liu |
Micro-Honeypot: Using Browser Fingerprinting to Track Attackers. |
DSC |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Chenpeng Ding, Jiangtao Zhai, Yuewei Dai |
An Improved ICS Honeypot Based on SNAP7 and IMUNES. |
ICCCS (1) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Jonas Müller, Christoph Anneser, Malte Sandstede, Lea Rieger, Adnan Alhomssi, Felix Schwarzmeier, Björn Bittner, Ilhan Aslan, Elisabeth André |
Honeypot: A Socializing App to Promote Train Commuters' Wellbeing. |
MUM |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Jörg Daubert, Dhanasekar Boopalan, Max Mühlhäuser, Emmanouil Vasilomanolakis |
HoneyDrone: A medium-interaction unmanned aerial vehicle honeypot. |
NOMS |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Emmanouil Vasilomanolakis, Jörg Daubert, Dhanasekar Boopalan, Max Mühlhäuser |
Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot. |
NOMS |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Alejandro Carrasco, Jorge Ropero, Paulino Ruiz-de-Clavijo, Jaime Benjumea, Amalia Luque |
A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot. |
QRS Companion |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Nitin Naik, Changjing Shang, Qiang Shen 0001, Paul Jenkins |
Intelligent Dynamic Honeypot Enabled by Dynamic Fuzzy Rule Interpolation. |
HPCC/SmartCity/DSS |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya |
U-PoT: A Honeypot Framework for UPnP-Based IoT Devices. |
IPCCC |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Lionel Metongnon, Ramin Sadre |
Beyond Telnet: Prevalence of IoT Protocols in Telescope and Honeypot Measurements. |
WTMC@SIGCOMM |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Marius Lihet, Vasile Dadarlat |
Honeypot in the cloud Five years of data analysis. |
RoEduNet |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Dubravko Sever, Tonimir Kisasondi |
Efficiency and security of docker based honeypot systems. |
MIPRO |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Ionut Cernica, Nirvana Popescu |
Wordpress Honeypot Module. |
EUC |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Hamad Al-Mohannadi, Irfan Awan, Jassim Al Hamar, Andrea J. Cullen, Jules Pagna Disso, Lorna Armitage |
Cyber Threat Intelligence from Honeypot Data Using Elasticsearch. |
AINA |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Nitin Naik, Paul Jenkins, Nick Savage 0001 |
Threat-Aware Honeypot for Discovering and Predicting Fingerprinting Attacks Using Principal Components Analysis. |
SSCI |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Nitin Naik, Changjing Shang, Qiang Shen 0001, Paul Jenkins |
Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation. |
SSCI |
2018 |
DBLP DOI BibTeX RDF |
|
17 | H. Hakan Kilinc, Omer Faruk Acar |
Analysis of attack and attackers on VoIP Honeypot environment. |
SIU |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Eva Chovancová, Norbert Ádám, Anton Baláz, Emília Pietriková, Peter Fecilak, Slavomír Simonák, Martin Chovanec |
Securing Distributed Computer Systems Using an Advanced Sophisticated Hybrid Honeypot Technology. |
Comput. Informatics |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Neha Agrawal, Shashikala Tapaswi |
The Performance Analysis of Honeypot Based Intrusion Detection System for Wireless Network. |
Int. J. Wirel. Inf. Networks |
2017 |
DBLP DOI BibTeX RDF |
|
17 | L. Sivakamy, S. Pradheepkumar, Sivabalan Arumugam, Anand R. Prasad |
Real-Time Attack Monitoring on Telecom Network Using Open-Source Darknet and Honeypot Setup. |
J. ICT Stand. |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón, Hans Dieter Schotten |
YAAS - On the Attribution of Honeypot Data. |
Int. J. Cyber Situational Aware. |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Saurabh Chamotra, Rakesh Kumar Sehgal, Ram Swaroop Misra |
Honeypot Baselining for Zero Day Attack Detection. |
Int. J. Inf. Secur. Priv. |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Kun Wang 0005, Miao Du, Sabita Maharjan, Yanfei Sun |
Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid. |
IEEE Trans. Smart Grid |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Wenjun Fan, Zhihui Du, David Fernández 0002, Víctor A. Villagrá |
Enabling an Anatomic View to Investigate Honeypot Systems: A Survey. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
17 | Jana Medková, Martin Husák, Martin Vizváry, Pavel Celeda |
Honeypot testbed for network defence strategy evaluation. |
IM |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Wenjun Fan, David Fernández 0002 |
A novel SDN based stealthy TCP connection handover mechanism for hybrid honeypot systems. |
NetSoft |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón, Hans Dieter Schotten |
Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot. |
Cyber Security |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Htein Lin, Stephen Dunlap, Mason Rice, Barry E. Mullins |
Generating Honeypot Traffic for Industrial Control Systems. |
Critical Infrastructure Protection |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Daniel Fraunholz, Marc Zimmermann, Alexander Hafner, Hans D. Schotten |
Data Mining in Long-Term Honeypot Data. |
ICDM Workshops |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Yan Zhang, Chong Di, Zhuoran Han, Yichen Li, Shenghong Li 0001 |
An Adaptive Honeypot Deployment Algorithm Based on Learning Automata. |
DSC |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Miao Du, Yongzhong Li, Qing Lu, Kun Wang 0005 |
Bayesian Game Based Pseudo Honeypot Model in Social Networks. |
ICCCS (2) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Seamus Dowling, Michael Schukat, Hugh Melvin |
Using analysis of temporal variances within a honeypot dataset to better predict attack type probability. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Jarko Papalitsas, Sampsa Rauti, Ville Leppänen |
A Comparison of Record and Play Honeypot Designs. |
CompSysTech |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Jianhong Cao, Wei Li, Jianjun Li, Bo Li 0005 |
DiPot: A Distributed Industrial Honeypot System. |
SmartCom |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Stipe Kuman, Stjepan Gros, Miljenko Mikuc |
An experiment in using IMUNES and Conpot to emulate honeypot control networks. |
MIPRO |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Marcus Paul Gutierrez, Christopher Kiekintveld |
Adapting Honeypot Configurations to Detect Evolving Exploits. |
AAAI Workshops |
2017 |
DBLP BibTeX RDF |
|
17 | Joni Uitto, Sampsa Rauti, Samuel Laurén, Ville Leppänen |
A Survey on Anti-honeypot and Anti-introspection Methods. |
WorldCIST (2) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser |
Virtual Machine Introspection Based SSH Honeypot. |
SHCIS@DAIS |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Feng Xiao, Enhong Chen, Qiang Xu |
S7commTrace: A High Interactive Honeypot for Industrial Control System Based on S7 Protocol. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Marcus Gutierrez, Christopher Kiekintveld |
Adapting with Honeypot Configurations to Detect Evolving Exploits. |
AAMAS |
2017 |
DBLP BibTeX RDF |
|
17 | H. Hakan Kilinc, Ugur Cagal |
Detecting VoIP fuzzing attacks by using a honeypot system. |
SIU |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Samuel Litchfield, David Formby, Jonathan D. Rogers, A. P. Sakis Meliopoulos, Raheem A. Beyah |
Rethinking the Honeypot for Cyber-Physical Systems. |
IEEE Internet Comput. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Ci-Bin Jiang, I-Hsien Liu, Yao-Nien Chung, Jung-Shian Li |
Novel intrusion prediction mechanism based on honeypot log similarity. |
Int. J. Netw. Manag. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow |
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats. |
J. Inf. Process. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Quang Duy La, Tony Q. S. Quek, Jemin Lee, Shi Jin 0002, Hongbo Zhu 0002 |
Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things. |
IEEE Internet Things J. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | M. Rajesh Babu, G. Usha |
A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET. |
Wirel. Pers. Commun. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Marcin Nawrocki, Matthias Wählisch, Thomas C. Schmidt, Christian Keil, Jochen Schönfelder |
A Survey on Honeypot Software and Data Analysis. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
17 | Abdeljalil Agnaou, Anas Abou El Kalam, Abdellah Ait Ouahman, Mina De Montfort |
Reduce positive and negative falses from attacks collected from the deployment of distributed honeypot network. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
17 | Zhenxin Zhan, Maochao Xu, Shouhuai Xu |
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
17 | Dileep Basam, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront |
Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities. |
J. Electr. Comput. Eng. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Hyung-Jin Mun, Kun-Hee Han |
Blackhole attack: user identity and password seize attack using honeypot. |
J. Comput. Virol. Hacking Tech. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Tomas Sochor, Matej Zuzcak |
High-Interaction Linux Honeypot Architecture in Recent Perspective. |
CN |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Michal Buda, Ilona Bluemke |
Data Mining Algorithms in the Analysis of Security Logs from a Honeypot System. |
DepCoS-RELCOMEX |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Saurabh Chamotra, Rakesh Kumar Sehgal, Sanjeev Ror, Bhupendra Singh |
Honeypot Deployment in Broadband Networks. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Ruxandra Trandafir, Mihai Carabas, Razvan Rughinis, Nicolae Tapus |
HoneYDSPK: Cisco onePK implementation for anomaly-based IDS and honeypot services. |
RoEduNet |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Mathias Wegerer, Simon Tjoa |
Defeating the Database Adversary Using Deception - A MySQL Database Honeypot. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Niels Wouters, John Downs, Mitchell Harrop, Travis Cox, Eduardo Araujo Oliveira, Sarah Webber, Frank Vetere, Andrew Vande Moere |
Uncovering the Honeypot Effect: How Audiences Engage with Public Interactive Systems. |
Conference on Designing Interactive Systems |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Ariel Bar, Bracha Shapira, Lior Rokach, Moshe Unger |
Scalable attack propagation model and algorithms for honeypot systems. |
IEEE BigData |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Otto Hrad, Simo Kemppainen |
Honeypot utilization for analyzing cyber attacks. |
ECSA Workshops |
2016 |
DBLP BibTeX RDF |
|
17 | Samuel Laurén, Sampsa Rauti, Ville Leppänen |
An interface diversified honeypot for malware analysis. |
ECSA Workshops |
2016 |
DBLP BibTeX RDF |
|
17 | Michele Bombardieri, Salvatore Castanò, Fabrizio Curcio, Angelo Furfaro, Helen D. Karatza |
Honeypot-Powered Malware Reverse Engineering. |
IC2E Workshops |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Chris Moore 0001 |
Detecting Ransomware with Honeypot Techniques. |
CCC |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Amos O. Olagunju, Farouk Samu |
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
17 | A. M. Leonard, Hang Cai, Krishna K. Venkatasubramanian, M. Ali, Thomas Eisenbarth 0001 |
A honeypot system for wearable networks. |
Sarnoff Symposium |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Sven Schindler |
Honeypot architectures for IPv6 networks. |
|
2016 |
RDF |
|
17 | Nilesh Chakraborty, Samrat Mondal |
HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attack. |
Int. J. Trust. Manag. Comput. Commun. |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Weizhe Zhang, Hui He, Tai-Hoon Kim |
Xen-based virtual honeypot system for smart device. |
Multim. Tools Appl. |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Mitsuaki Akiyama, Takeshi Yagi, Youki Kadobayashi, Takeo Hariu, Suguru Yamaguchi |
Client Honeypot Multiplication with High Performance and Precise Detection. |
IEICE Trans. Inf. Syst. |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Michele Bombardieri, Salvatore Castanò, Fabrizio Curcio, Angelo Furfaro |
Honeypot-powered Malware Reverse Engineering. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
17 | Chun-Yi Wang, Ya-Lyue Jhao, Chuan-Sheng Wang, Shih-Jen Chen, Fu-Hau Hsu, Yao-Hsin Chen |
The bilateral communication-based dynamic extensible honeypot. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
17 | M. Solomon Zemene, P. S. Avadhani |
Implementing high interaction honeypot to study SSH attacks. |
ICACCI |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Philippe Owezarski |
A Near Real-Time Algorithm for Autonomous Identification and Characterization of Honeypot Attacks. |
AsiaCCS |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Chris Moore 0001, Ameer Al-Nemrat |
An Analysis of Honeypot Programs and the Attack Data Collected. |
ICGS3 |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Emmanouil Vasilomanolakis, Shankar Karuppayah, Panayotis Kikiras, Max Mühlhäuser |
A honeypot-driven cyber incident monitor: lessons learned and steps ahead. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Christoph Pohl, Alf Zugenmaier, Michael Meier 0001, Hans-Joachim Hof |
B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Emmanouil Vasilomanolakis, Shreyas Srinivasa, Max Mühlhäuser |
Did you really hack a nuclear power plant? An industrial control mobile honeypot. |
CNS |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Ronald M. Campbell, Keshnee Padayachee, Themba Masombuka |
A survey of honeypot research: Trends and opportunities. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Marius Alin Lihet, Vasile Dadarlat |
How to build a honeypot System in the cloud. |
RoEduNet |
2015 |
DBLP DOI BibTeX RDF |
|
17 | K. Harald Gjermundrød, Ioanna Dionysiou |
CloudHoneyCY - An Integrated Honeypot Framework for Cloud Infrastructures. |
UCC |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Luigi Catuogno, Aniello Castiglione, Francesco Palmieri 0002 |
A honeypot system with honeyword-driven fake interactive sessions. |
HPCS |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Andreas Christoforou, K. Harald Gjermundrød, Ioanna Dionysiou |
HoneyCY: a configurable unified management framework for open-source honeypot services. |
Panhellenic Conference on Informatics |
2015 |
DBLP DOI BibTeX RDF |
|