|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 139 occurrences of 75 keywords
|
|
|
Results
Found 332 publication records. Showing 332 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Konstantinos Xinidis, Evangelos P. Markatos, Angelos D. Keromytis |
Detecting Targeted Attacks Using Shadow Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005, 2005, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
19 | Cláudia J. Barenco Abbas, Alessandra Lafetá, Giuliano Arruda, Luis Javier García-Villalba |
A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University's Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, In conjunction with ICEIS2005, Miami, USA, May 2005, pp. 84-93, 2005, INSTICC Press, 972-8865-25-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
19 | Maximillian Dornseif, Thorsten Holz, Sven Müller |
Honeypots and Limitations of Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFN-Arbeitstagung über Kommunikationsnetze ![In: `Heute schon das Morgen sehen`, 19. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, 2004, pp. 235-252, 2005, GI, 3-88579-402-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
19 | Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz |
Vulnerability Assessment using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Prax. Inf.verarb. Kommun. ![In: Prax. Inf.verarb. Kommun. 27(4), pp. 195-201, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Michael Meier 0001, Ulrich Flegel, Hartmut König |
Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Prax. Inf.verarb. Kommun. ![In: Prax. Inf.verarb. Kommun. 27(4), pp. 186-187, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Balachander Krishnamurthy |
Mohonk: mobile honeypots to trace unwanted traffic early. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetT@SIGCOMM ![In: Proceedings of the ACM SIGCOMM Workshop on Network Troubleshooting - Research, Theory and Operations Practice Meet Malfunctioning Reality, NetT '04, Portland, Oregon, USA, September 3, 2004, pp. 277-282, 2004, ACM. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Ioanis Nikolaidis |
Honeypots, tracking hackers [Book Reviews]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 17(4), pp. 5, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Lance Spitzner |
Honeypots: Catching the Insider Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 170-179, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Peter H. Salus, Anton Chuvakin |
Incident Response, and of Lance Spitzner: Honeypots: Tracking Hackers, reviewed by Eugene Schultz and Russell Shumway. ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 27(5), 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
19 | Brian Scottberg, William Yurcik, David Doss |
Internet honeypots: protection or entrapment? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISTAS ![In: 2002 International Symposium on Technology and Society, ISTAS 2002, Raleigh, NC, USA, June 8, 2002, pp. 387-391, 2002, IEEE, 0-7803-7284-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Nathalie Weiler |
Honeypots for Distributed Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 10-12 June 2002, Pittsburgh, PA, USA, pp. 109-114, 2002, IEEE Computer Society, 0-7695-1748-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Security Practices, Honeypot, Distributed Denial of Service Attacks |
15 | Fernando Sanchez, Zhenhai Duan, Yingfei Dong |
Blocking spam by separating end-user machines from legitimate mail server machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEAS ![In: The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS 2011, Perth, Australia, September 1-2, 2011, Proceedings, pp. 116-124, 2011, ACM, 978-1-4503-0788-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Wei Lu 0018, Mahbod Tavallaee, Ali A. Ghorbani 0001 |
Automatic discovery of botnet communities on large-scale communication networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 1-10, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
botnet detection, machine learning, traffic classification |
15 | Marc Dacier, Van-Hau Pham, Olivier Thonnard |
The WOMBAT Attack Attribution Method: Some Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 19-37, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Yu Adachi, Yoshihiro Oyama |
Malware analysis system using process-level virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia, pp. 550-556, 2009, IEEE Computer Society, 978-1-4244-4672-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Multi-aspect profiling of kernel rootkit behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, pp. 47-60, 2009, ACM, 978-1-60558-482-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
kernel rootkit, profiling, malware |
15 | Eric Alata, Ion Alberdi, Vincent Nicomette, Philippe Owezarski, Mohamed Kaâniche |
Internet attacks monitoring with dynamic connection redirection mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(2), pp. 127-136, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Robin Berthier, Dave Kormann, Michel Cukier, Matti A. Hiltunen, Gregg Vesonder, Daniel Sheleheda |
On the Comparison of Network Attack Datasets: An Empirical Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, Nanjing, China, December 3 - 5, 2008, pp. 39-48, 2008, IEEE Computer Society, 978-0-7695-3482-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Cormac Herley, Dinei A. F. Florêncio |
Protecting Financial Institutions from Brute-Force Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 681-685, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Robin E. Bloomfield, Ilir Gashi, Andrey Povyakalo, Vladimir Stankovic 0002 |
Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 11-14 November 2008, Seattle/Redmond, WA, USA, pp. 219-228, 2008, IEEE Computer Society, 978-0-7695-3405-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov |
Learning and Classification of Malware Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 108-125, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | David Stirling, Ian Welch, Peter Komisarczuk |
Designing Workflows for Grid Enabled Internet Instruments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France, pp. 218-225, 2008, IEEE Computer Society, 978-0-7695-3156-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
GEII, Client Honey Pot, Workflow, BPEL |
15 | E. Ramirez-Silva, Marc Dacier |
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings, pp. 198-211, 2007, Springer, 978-3-540-76927-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Cláudia J. Barenco Abbas, L. Javier García-Villalba, Victoria López López |
Implementation and Attacks Analysis of a Honeypot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 489-502, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Brian Eriksson, Paul Barford, Robert D. Nowak, Mark Crovella |
Learning network structure from passive measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007, pp. 209-214, 2007, ACM, 978-1-59593-908-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
measurement, topology, embedding, inference, imputation |
15 | Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray |
Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings, pp. 135-149, 2006, Springer, 3-540-34295-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb |
Lessons learned from the deployment of a high-interaction honeypot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC ![In: Sixth European Dependable Computing Conference, EDCC 2006, Coimbra, Portugal, 18-20 October 2006, pp. 39-46, 2006, IEEE Computer Society, 0-7695-2648-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Samuel T. King, Peter M. Chen |
Backtracking intrusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 23(1), pp. 51-76, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
information flow, Computer forensics, intrusion analysis |
15 | Ashish Arora, Rahul Telang |
Economics of Software Vulnerability Disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(1), pp. 20-25, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
disclosure policy, patching, software vulnerability, economic analysis |
15 | Jacob Zimmermann, Andrew J. Clark, George M. Mohay, Fabien Pouget, Marc Dacier |
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SADFE ![In: First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 7-10 November 2005, Taipei, Taiwan, pp. 89-104, 2005, IEEE Computer Society, 0-7695-2478-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Brian Hernacki, Jeremy Bennett, Thomas Lofgren |
Symantec Deception Server Experience with a Commercial Deception System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 188-202, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ManTrap, Honeypot, Deception |
15 | Samuel T. King, Peter M. Chen |
Backtracking intrusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, SOSP 2003, Bolton Landing, NY, USA, October 19-22, 2003, pp. 223-236, 2003, ACM, 1-58113-757-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
information flow, computer forensics, intrusion analysis |
Displaying result #301 - #332 of 332 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4] |
|