|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 139 occurrences of 75 keywords
|
|
|
Results
Found 332 publication records. Showing 332 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Konstantinos Xinidis, Evangelos P. Markatos, Angelos D. Keromytis |
Detecting Targeted Attacks Using Shadow Honeypots. |
USENIX Security Symposium |
2005 |
DBLP BibTeX RDF |
|
19 | Cláudia J. Barenco Abbas, Alessandra Lafetá, Giuliano Arruda, Luis Javier García-Villalba |
A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University's Network. |
WOSIS |
2005 |
DBLP BibTeX RDF |
|
19 | Maximillian Dornseif, Thorsten Holz, Sven Müller |
Honeypots and Limitations of Deception. |
DFN-Arbeitstagung über Kommunikationsnetze |
2005 |
DBLP BibTeX RDF |
|
19 | Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz |
Vulnerability Assessment using Honeypots. |
Prax. Inf.verarb. Kommun. |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Michael Meier 0001, Ulrich Flegel, Hartmut König |
Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment. |
Prax. Inf.verarb. Kommun. |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Balachander Krishnamurthy |
Mohonk: mobile honeypots to trace unwanted traffic early. |
NetT@SIGCOMM |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Ioanis Nikolaidis |
Honeypots, tracking hackers [Book Reviews]. |
IEEE Netw. |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Lance Spitzner |
Honeypots: Catching the Insider Threat. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Peter H. Salus, Anton Chuvakin |
Incident Response, and of Lance Spitzner: Honeypots: Tracking Hackers, reviewed by Eugene Schultz and Russell Shumway. |
login Usenix Mag. |
2002 |
DBLP BibTeX RDF |
|
19 | Brian Scottberg, William Yurcik, David Doss |
Internet honeypots: protection or entrapment? |
ISTAS |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Nathalie Weiler |
Honeypots for Distributed Denial of Service Attacks. |
WETICE |
2002 |
DBLP DOI BibTeX RDF |
Security Practices, Honeypot, Distributed Denial of Service Attacks |
15 | Fernando Sanchez, Zhenhai Duan, Yingfei Dong |
Blocking spam by separating end-user machines from legitimate mail server machines. |
CEAS |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Wei Lu 0018, Mahbod Tavallaee, Ali A. Ghorbani 0001 |
Automatic discovery of botnet communities on large-scale communication networks. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
botnet detection, machine learning, traffic classification |
15 | Marc Dacier, Van-Hau Pham, Olivier Thonnard |
The WOMBAT Attack Attribution Method: Some Results. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Yu Adachi, Yoshihiro Oyama |
Malware analysis system using process-level virtualization. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Multi-aspect profiling of kernel rootkit behavior. |
EuroSys |
2009 |
DBLP DOI BibTeX RDF |
kernel rootkit, profiling, malware |
15 | Eric Alata, Ion Alberdi, Vincent Nicomette, Philippe Owezarski, Mohamed Kaâniche |
Internet attacks monitoring with dynamic connection redirection mechanisms. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Robin Berthier, Dave Kormann, Michel Cukier, Matti A. Hiltunen, Gregg Vesonder, Daniel Sheleheda |
On the Comparison of Network Attack Datasets: An Empirical Analysis. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Cormac Herley, Dinei A. F. Florêncio |
Protecting Financial Institutions from Brute-Force Attacks. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Robin E. Bloomfield, Ilir Gashi, Andrey Povyakalo, Vladimir Stankovic 0002 |
Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network. |
ISSRE |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov |
Learning and Classification of Malware Behavior. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
15 | David Stirling, Ian Welch, Peter Komisarczuk |
Designing Workflows for Grid Enabled Internet Instruments. |
CCGRID |
2008 |
DBLP DOI BibTeX RDF |
GEII, Client Honey Pot, Workflow, BPEL |
15 | E. Ramirez-Silva, Marc Dacier |
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. |
ASIAN |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Cláudia J. Barenco Abbas, L. Javier García-Villalba, Victoria López López |
Implementation and Attacks Analysis of a Honeypot. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Brian Eriksson, Paul Barford, Robert D. Nowak, Mark Crovella |
Learning network structure from passive measurements. |
Internet Measurement Conference |
2007 |
DBLP DOI BibTeX RDF |
measurement, topology, embedding, inference, imputation |
15 | Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray |
Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. |
iTrust |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb |
Lessons learned from the deployment of a high-interaction honeypot. |
EDCC |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Samuel T. King, Peter M. Chen |
Backtracking intrusions. |
ACM Trans. Comput. Syst. |
2005 |
DBLP DOI BibTeX RDF |
information flow, Computer forensics, intrusion analysis |
15 | Ashish Arora, Rahul Telang |
Economics of Software Vulnerability Disclosure. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
disclosure policy, patching, software vulnerability, economic analysis |
15 | Jacob Zimmermann, Andrew J. Clark, George M. Mohay, Fabien Pouget, Marc Dacier |
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. |
SADFE |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Brian Hernacki, Jeremy Bennett, Thomas Lofgren |
Symantec Deception Server Experience with a Commercial Deception System. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
ManTrap, Honeypot, Deception |
15 | Samuel T. King, Peter M. Chen |
Backtracking intrusions. |
SOSP |
2003 |
DBLP DOI BibTeX RDF |
information flow, computer forensics, intrusion analysis |
Displaying result #301 - #332 of 332 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4] |
|