The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Honeypot with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2004 (29) 2005-2006 (34) 2007 (22) 2008 (21) 2009 (26) 2010 (20) 2011-2012 (33) 2013 (16) 2014-2015 (31) 2016 (25) 2017 (24) 2018 (34) 2019 (45) 2020 (32) 2021 (51) 2022 (33) 2023 (56) 2024 (9)
Publication types (Num. hits)
article(178) book(1) incollection(1) inproceedings(356) phdthesis(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 140 occurrences of 68 keywords

Results
Found 541 publication records. Showing 541 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Shyam K. Gupta 0001, Renu Damor, Anand Gupta, Vikram Goyal OCHD: Preserving Obliviousness Characteristic of Honeypot Database. Search on Bibsonomy COMAD The full citation details ... 2006 DBLP  BibTeX  RDF
17Shyam K. Gupta 0001, Anand Gupta, Renu Damor, Vikram Goyal, Sangeeta Sabharwal Preserving Obliviousness Characteristic of Honeypot database. Search on Bibsonomy COMAD The full citation details ... 2006 DBLP  BibTeX  RDF
17Myung-Sub Lee, Chang-Hyeon Park, Myung-Chun Ryoo, Joon-Ho Park An Active Intrusion-Confronting System Using Fake Session and honeypot. Search on Bibsonomy International Conference on Internet Computing The full citation details ... 2006 DBLP  BibTeX  RDF
17Fabien Pouget "Système distribué de capteurs pots de miel: discrimination et analyse corrélative des processus d'attaques". ("Distributed System of Honeypot Sneosrs: Discrimination and Correlative Analysis of Attack Processes"). Search on Bibsonomy 2006   RDF
17Felix Wu Should we share honeypot information for security management? Search on Bibsonomy Integrated Network Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Jeffrey L. Hieb, James H. Graham Anomaly-Based Intrusion Monitoring Using a Dynamic Honeypot. Search on Bibsonomy CATA The full citation details ... 2005 DBLP  BibTeX  RDF
17Craig Valli Honeypot technologies and their applicability as an internal countermeasure. Search on Bibsonomy Australian Computer, Network & Information Forensics Conference The full citation details ... 2005 DBLP  BibTeX  RDF
17Cláudia J. Barenco Abbas, Alessandra Lafetá, Giuliano Arruda, Luis Javier García-Villalba A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University's Network. Search on Bibsonomy WOSIS The full citation details ... 2005 DBLP  BibTeX  RDF
17Patrick Diebold, Andreas Hess 0003, Günter Schäfer A Honeypot Architecture for Detecting and Analyzing Unknown Network Attacks. Search on Bibsonomy KiVS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Suen Yek Implementing network defence using deception in a wireless honeypot. Search on Bibsonomy Australian Computer, Network & Information Forensics Conference The full citation details ... 2004 DBLP  BibTeX  RDF
17Niels Provos A Virtual Honeypot Framework. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2004 DBLP  BibTeX  RDF
17Juhou He, Xiuqing He, Weihua Li Cooperative Honeypot Model and Implementation. Search on Bibsonomy SNPD The full citation details ... 2004 DBLP  BibTeX  RDF
17Anton Chuvakin Honeypot Essentials. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Suen Yek Measuring the Effectiveness of Deception in a Wireless Honeypot. Search on Bibsonomy Australian Computer, Network & Information Forensics Conference The full citation details ... 2003 DBLP  BibTeX  RDF
17Terry Griffin Analysis Tool for Honeypot Systems. Search on Bibsonomy CAINE The full citation details ... 2003 DBLP  BibTeX  RDF
17Lance Spitzner HOSUS (Honeypot Surveillance System). Search on Bibsonomy login Usenix Mag. The full citation details ... 2002 DBLP  BibTeX  RDF
15Kyumin Lee, James Caverlee, Steve Webb Uncovering social spammers: social honeypots + machine learning. Search on Bibsonomy SIGIR The full citation details ... 2010 DBLP  DOI  BibTeX  RDF social honeypots, social media, spam
15Sourour Meharouech, Adel Bouhoula, Tarek Abbes Ensuring security in depth based on heterogeneous network security technologies. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Management of interaction, Devices’ collaboration, Network security, Security technologies
15Pantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Anna Sperotto, Ramin Sadre, Frank E. van Vliet, Aiko Pras A Labeled Data Set for Flow-Based Intrusion Detection. Search on Bibsonomy IPOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15André Bergholz AntiPhish: lessons learnt. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Oussama Allali, Matthieu Latapy, Clémence Magnien Measurement of eDonkey activity with distributed honeypots. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Chih-Hung Chang A Low-Cost Green IT Design and Application of VHSP Based on Virtualization Technology. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Christian Seifert, Ian Welch, Peter Komisarczuk Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF client honeypots, security, algorithms, intrusion detection, performance improvement
15Van-Hau Pham, Marc Dacier, Guillaume Urvoy-Keller, Taoufik En-Najjary The Quest for Multi-headed Worms. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Georgios Portokalidis, Herbert Bos Eudaemon: involuntary and on-demand emulation against zero-day exploits. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, operating systems, honeypots
15Daniel Ramsbrock, Robin Berthier, Michel Cukier Profiling Attacker Behavior Following SSH Compromises. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Mark S. Withall, M. Shirantha de Silva, David J. Parish, Iain Phillips 0002 Honey Plotter and the Web of Terror. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Xin Hu, Zhuoqing Morley Mao Accurate Real-time Identification of IP Prefix Hijacking. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Eva Hornecker, Paul Marshall, Yvonne Rogers From entry to access: how shareability comes about. Search on Bibsonomy DPPI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Chang-Hsien Tsai, Shih-Kun Huang Detection and Diagnosis of Control Interception. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Stelios Sidiroglou, Angelos D. Keromytis Execution transactions for defending against software failures: use and evaluation. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Transactional Execution, Buffer overflows, Exception
15Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling The Nepenthes Platform: An Efficient Approach to Collect Malware. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15David Duncombe, George M. Mohay, Andrew J. Clark Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF immunological., intrusion detection, alert correlation
15Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Yong Tang 0004, Shigang Chen Defending against Internet worms: a signature-based approach. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Christian Kreibich, Jon Crowcroft Honeycomb: creating intrusion detection signatures using honeypots. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF longest-common-substring algorithms, traffic signatures, suffix trees, honeypots, network intrusion detection, protocol analysis, pattern detection
15Lawrence Teo, Yu-An Sun, Gail-Joon Ahn Defeating Internet Attacks Using Risk Awareness and Active Honeypots. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Japonica, Risk Awareness, Honeypots, Colored Petri Nets
15Vishal Chowdhary, Alok Tongaonkar, Tzi-cker Chiueh Towards Automatic Learning of Valid Services for Honeypots. Search on Bibsonomy ICDCIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Sherif M. Khattab, Chatree Sangpachatanaruk, Daniel Mossé, Rami G. Melhem, Taieb Znati Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks. Search on Bibsonomy ICDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Bill McCarty The Honeynet Arms Race. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF data-capture tools, honeynets, data capture
Displaying result #501 - #541 of 541 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license