The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for honeypots with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2004 (25) 2005 (15) 2006-2007 (34) 2008 (23) 2009 (16) 2010-2011 (21) 2012-2013 (24) 2014-2015 (23) 2016 (17) 2017-2018 (29) 2019 (16) 2020 (20) 2021 (17) 2022 (29) 2023 (21) 2024 (2)
Publication types (Num. hits)
article(78) book(2) incollection(5) inproceedings(238) phdthesis(9)
Venues (Conferences, Journals, ...)
CoRR(31) RAID(7) IEEE Secur. Priv.(6) CN(5) DIMVA(5) HICSS(5) ICC(5) ARES(4) CCS(4) Future Internet(4) NOMS(4) ACM Southeast Regional Confere...(3) ACSAC(3) EuroS&P Workshops(3) EuroSys(3) IEEE ICBC(3) More (+10 of total 209)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 139 occurrences of 75 keywords

Results
Found 332 publication records. Showing 332 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Konstantinos Xinidis, Evangelos P. Markatos, Angelos D. Keromytis Detecting Targeted Attacks Using Shadow Honeypots. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2005 DBLP  BibTeX  RDF
19Cláudia J. Barenco Abbas, Alessandra Lafetá, Giuliano Arruda, Luis Javier García-Villalba A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University's Network. Search on Bibsonomy WOSIS The full citation details ... 2005 DBLP  BibTeX  RDF
19Maximillian Dornseif, Thorsten Holz, Sven Müller Honeypots and Limitations of Deception. Search on Bibsonomy DFN-Arbeitstagung über Kommunikationsnetze The full citation details ... 2005 DBLP  BibTeX  RDF
19Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz Vulnerability Assessment using Honeypots. Search on Bibsonomy Prax. Inf.verarb. Kommun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Michael Meier 0001, Ulrich Flegel, Hartmut König Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment. Search on Bibsonomy Prax. Inf.verarb. Kommun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Balachander Krishnamurthy Mohonk: mobile honeypots to trace unwanted traffic early. Search on Bibsonomy NetT@SIGCOMM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Ioanis Nikolaidis Honeypots, tracking hackers [Book Reviews]. Search on Bibsonomy IEEE Netw. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Lance Spitzner Honeypots: Catching the Insider Threat. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Peter H. Salus, Anton Chuvakin Incident Response, and of Lance Spitzner: Honeypots: Tracking Hackers, reviewed by Eugene Schultz and Russell Shumway. Search on Bibsonomy login Usenix Mag. The full citation details ... 2002 DBLP  BibTeX  RDF
19Brian Scottberg, William Yurcik, David Doss Internet honeypots: protection or entrapment? Search on Bibsonomy ISTAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Nathalie Weiler Honeypots for Distributed Denial of Service Attacks. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Security Practices, Honeypot, Distributed Denial of Service Attacks
15Fernando Sanchez, Zhenhai Duan, Yingfei Dong Blocking spam by separating end-user machines from legitimate mail server machines. Search on Bibsonomy CEAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Wei Lu 0018, Mahbod Tavallaee, Ali A. Ghorbani 0001 Automatic discovery of botnet communities on large-scale communication networks. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF botnet detection, machine learning, traffic classification
15Marc Dacier, Van-Hau Pham, Olivier Thonnard The WOMBAT Attack Attribution Method: Some Results. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Yu Adachi, Yoshihiro Oyama Malware analysis system using process-level virtualization. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Ryan D. Riley, Xuxian Jiang, Dongyan Xu Multi-aspect profiling of kernel rootkit behavior. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF kernel rootkit, profiling, malware
15Eric Alata, Ion Alberdi, Vincent Nicomette, Philippe Owezarski, Mohamed Kaâniche Internet attacks monitoring with dynamic connection redirection mechanisms. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Robin Berthier, Dave Kormann, Michel Cukier, Matti A. Hiltunen, Gregg Vesonder, Daniel Sheleheda On the Comparison of Network Attack Datasets: An Empirical Analysis. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Cormac Herley, Dinei A. F. Florêncio Protecting Financial Institutions from Brute-Force Attacks. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Robin E. Bloomfield, Ilir Gashi, Andrey Povyakalo, Vladimir Stankovic 0002 Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network. Search on Bibsonomy ISSRE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov Learning and Classification of Malware Behavior. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15David Stirling, Ian Welch, Peter Komisarczuk Designing Workflows for Grid Enabled Internet Instruments. Search on Bibsonomy CCGRID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF GEII, Client Honey Pot, Workflow, BPEL
15E. Ramirez-Silva, Marc Dacier Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Cláudia J. Barenco Abbas, L. Javier García-Villalba, Victoria López López Implementation and Attacks Analysis of a Honeypot. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Brian Eriksson, Paul Barford, Robert D. Nowak, Mark Crovella Learning network structure from passive measurements. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF measurement, topology, embedding, inference, imputation
15Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. Search on Bibsonomy iTrust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb Lessons learned from the deployment of a high-interaction honeypot. Search on Bibsonomy EDCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Samuel T. King, Peter M. Chen Backtracking intrusions. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information flow, Computer forensics, intrusion analysis
15Ashish Arora, Rahul Telang Economics of Software Vulnerability Disclosure. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF disclosure policy, patching, software vulnerability, economic analysis
15Jacob Zimmermann, Andrew J. Clark, George M. Mohay, Fabien Pouget, Marc Dacier The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. Search on Bibsonomy SADFE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Brian Hernacki, Jeremy Bennett, Thomas Lofgren Symantec Deception Server Experience with a Commercial Deception System. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ManTrap, Honeypot, Deception
15Samuel T. King, Peter M. Chen Backtracking intrusions. Search on Bibsonomy SOSP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF information flow, computer forensics, intrusion analysis
Displaying result #301 - #332 of 332 (100 per page; Change: )
Pages: [<<][1][2][3][4]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license