|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 140 occurrences of 68 keywords
|
|
|
Results
Found 541 publication records. Showing 541 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
134 | Sherif M. Khattab, Rami G. Melhem, Daniel Mossé, Taieb Znati |
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
105 | Yuqing Mai, Radhika Upadrashta, Xiao Su |
J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
102 | Xuxian Jiang, Xinyuan Wang 0005 |
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
90 | Anh-Quynh Nguyen, Yoshiyasu Takefuji |
Towards an Invisible Honeypot Monitoring System. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
87 | Cormac Herley, Dinei A. F. Florêncio |
Protecting Financial Institutions from Brute-Force Attacks. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
79 | Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun 0001 |
Real-Time Emulation of Intrusion Victim in HoneyFarm. |
AWCC |
2004 |
DBLP DOI BibTeX RDF |
interception proxy, reverse firewall, Honeypot, intrusion |
75 | Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang |
HonIDS: Enhancing Honeypot System with Intrusion Detection Models. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Junfeng Tian, Jian-ling Wang, Xiao-hui Yang, Ren-ling Li |
A Study of Intrusion Signature Based on Honeypot. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
75 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics Part I: Analyzing the Network. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
blackhat, honeypots, honeynets |
75 | Neal Krawetz |
Anti-Honeypot Technology. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
spam, honeypots, honeynets, trackers |
75 | Iyad Kuwatly, Malek Sraj, Zaid Al Masri, Hassan Artail |
A Dynamic Honeypot Design for Intrusion Detection. |
ICPS |
2004 |
DBLP DOI BibTeX RDF |
|
73 | Eric Alata, Ion Alberdi, Vincent Nicomette, Philippe Owezarski, Mohamed Kaâniche |
Internet attacks monitoring with dynamic connection redirection mechanisms. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
67 | Anjali Sardana, Ramesh Chandra Joshi |
Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level. |
ISIP |
2008 |
DBLP DOI BibTeX RDF |
Routing, DDoS, Honeypot |
67 | Zaiyao Yi, Liuqing Pan, Xinmei Wang, Chen Huang 0003, Benxiong Huang |
IP Traceback Using Digital Watermark and Honeypot. |
UIC |
2008 |
DBLP DOI BibTeX RDF |
IP Tracebak, digital watermark, honeypot |
67 | Huidong Jin 0001, Olivier Y. de Vel, Ke Zhang, Nianjun Liu |
Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks. |
Australasian Conference on Artificial Intelligence |
2008 |
DBLP DOI BibTeX RDF |
density-based cluster visualisation, honeypot data, Knowledge discovery, outlier detection, botnet, Internet security |
67 | Geng Yang, Chunming Rong, Yunping Dai |
A Distributed Honeypot System for Grid Security. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
Distributed System, Grid Computing, Network Security, Honeypot |
61 | Babak Khosravifar, Jamal Bentahar |
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Chao-Hsi Yeh, Chung-Huang Yang |
Design and implementation of honeypot systems based on open-source software. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Cliff Changchun Zou, Ryan Cunningham |
Honeypot-Aware Advanced Botnet Construction and Maintenance. |
DSN |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Miyoung Kim, Misun Kim, Youngsong Mun |
Design and Implementation of the HoneyPot System with Focusing on the Session Redirection. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Miyoung Kim, Misun Kim, Hyewon K. Lee, Youngsong Mun |
Design of Active HoneyPot System. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
|
58 | Takashi Minohara, Satoshi Ishikawa, Masahiro Amano |
Centralized Surveillance of Unused Address Space by using Virtual Networks. |
PRDC |
2005 |
DBLP DOI BibTeX RDF |
|
58 | W. Y. Chin, Evangelos P. Markatos, Spyros Antonatos, Sotiris Ioannidis |
HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
honeypot infrastructures, security, honeypot |
52 | Pei-Sheng Huang, Chung-Huang Yang, Tae-Nam Ahn |
Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection system, firewall, malware, worm, honeypot |
52 | Ming-Yang Su, Kai-Chi Chang, Chun-Yuen Lin |
Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Frequent Episodes Mining, Honeypot systems, Network Security |
52 | Erwin P. Rathgeb, Dirk Hoffstadt |
The E-Mail Honeypot System Concept, Implementation and Field Test Results. |
ICDS |
2008 |
DBLP DOI BibTeX RDF |
Spam, Phishing, Honeypot |
50 | Lokesh D. Pathak, Ben Soh |
Incorporating Data Mining Tools into a New Hybrid-IDS to Detect Known and Unknown Attacks. |
UIC |
2006 |
DBLP DOI BibTeX RDF |
Fault Tolerance, Network Security, Honeypot |
50 | Brian Hernacki, Jeremy Bennett, Thomas Lofgren |
Symantec Deception Server Experience with a Commercial Deception System. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
ManTrap, Honeypot, Deception |
50 | Nathalie Weiler |
Honeypots for Distributed Denial of Service Attacks. |
WETICE |
2002 |
DBLP DOI BibTeX RDF |
Security Practices, Honeypot, Distributed Denial of Service Attacks |
46 | Kyumin Lee, James Caverlee, Steve Webb |
The social honeypot project: protecting online communities from spammers. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
social honeypots, social media, spam |
46 | Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval |
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. |
HCI (16) |
2009 |
DBLP DOI BibTeX RDF |
counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks |
46 | Anjali Sardana, Ramesh Chandra Joshi |
Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Cláudia J. Barenco Abbas, L. Javier García-Villalba, Victoria López López |
Implementation and Attacks Analysis of a Honeypot. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Robert McGrew 0002, Rayford B. Vaughn |
Experiences with Honeypot Systems: Development, Deployment, and Analysis. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Pei-Te Chen, Chi-Sung Laih, Fabien Pouget, Marc Dacier |
Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. |
SADFE |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel 0001 |
Self Adaptive High Interaction Honeypots Driven by Game Theory. |
SSS |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Narisa Zhao, Xianfeng Zhang |
The Worm Propagation Model and Control Strategy Based on Distributed Honeynet. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Vinoo Thomas, Nitin Jyoti |
Bot countermeasures. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Vukasin Pejovic, Ivana Kovacevic, Slobodan Bojanic, Corado Leita, Jelena Popovic, Octavio Nieto-Taladriz |
Migrating a HoneyDepot to Hardware. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Xinwen Fu, Wei Yu 0002, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham |
On Recognizing Virtual Honeypots and Countermeasures. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Van-Hau Pham, Marc Dacier |
Honeypot Traces Forensics: The Observation Viewpoint Matters. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
attack trace analysis, botnet detection, honeypot |
35 | Sourour Meharouech, Adel Bouhoula, Tarek Abbes |
Collaboration between Security Devices toward improving Network Defense. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
Collaboration between Security Devices, vulnerability scanner, Network Security, Firewall, Honeypot, IPS |
35 | Jostein Jensen |
A Novel Testbed for Detection of Malicious Software Functionality. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
testbed, malware, honeypot, behavioural analysis |
35 | Shih-Yao Dai, Sy-Yen Kuo |
MAPMon: A Host-Based Malware Detection Tool. |
PRDC |
2007 |
DBLP DOI BibTeX RDF |
Auto-Start Extensibility Point, Malware Attacking Points, Honeypot, Malicious Software, Backdoor |
35 | Michael Vrable, Justin Ma, Jay Chen, David Moore 0001, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage |
Scalability, fidelity, and containment in the potemkin virtual honeyfarm. |
SOSP |
2005 |
DBLP DOI BibTeX RDF |
honeyfarm, malware, honeypot, virtual machine monitor, copy-on-write |
34 | A. Umamaheswari, B. Kalaavathi |
Honeypot TB-IDS: trace back model based intrusion detection system using knowledge based honeypot construction model. |
Clust. Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
34 | Cristian Pascariu, Ionut-Daniel Barbu |
Ransomware Honeypot: Honeypot solution designed to detect a ransomware infection identify the ransomware family. |
ECAI |
2019 |
DBLP DOI BibTeX RDF |
|
34 | Denis Lavrov, Veronique Blanchet, Shaoning Pang, Muyang He, Abdolhossein Sarrafzadeh |
COR-Honeypot: Copy-On-Risk, Virtual Machine as Honeypot in the Cloud. |
CLOUD |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Xiaoyan Sun, Yang Wang, Jie Ren, Yuefei Zhu, Shengli Liu 0003 |
Collecting Internet Malware Based on Client-side Honeypot. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier |
Automating the Analysis of Honeypot Data (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Internet threats analysis, malicious behavior characterization, Honeypots |
32 | Mohamed Nassar 0001, Radu State, Olivier Festor |
VoIP Honeypot Architecture. |
Integrated Network Management |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Anjali Sardana, Krishan Kumar 0001, Ramesh Chandra Joshi |
Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Anjali Sardana, Ramesh Chandra Joshi |
Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb |
Lessons learned from the deployment of a high-interaction honeypot. |
EDCC |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Neil C. Rowe |
Measuring the Effectiveness of Honeypot Counter-Counterdeception. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics, Part II: Analyzing the Compromised Host. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
network analysis, honeypots, honeynets |
29 | Yu Adachi, Yoshihiro Oyama |
Malware analysis system using process-level virtualization. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Martin Gilje Jaatun, Åsmund Ahlmann Nyre, Jan Tore Sørensen |
Survival by Deception. |
SAFECOMP |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Iyatiti Mokube, Michele Adams |
Honeypots: concepts, approaches, and challenges. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
types of honeypots, honeypots, legal issues |
29 | Simon P. Chung, Aloysius K. Mok |
Collaborative Intrusion Prevention. |
WETICE |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Mengjun Xie, Zhenyu Wu, Haining Wang |
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Theodor Richardson |
Preventing Attacks on Back-End Servers using Masquerading/Honeypots. |
SNPD |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong |
Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Corrado Leita, Ken Mermoud, Marc Dacier |
ScriptGen: an automated script generation tool for honeyd. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Lance Spitzner |
Honeypots: Catching the Insider Threat. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao |
Correlation Analysis between Spamming Botnets and Malware Infected Hosts. |
SAINT |
2011 |
DBLP DOI BibTeX RDF |
darknet, spam, malware, honeypot, botnet, correlation analysis |
20 | Akihiro Shimoda, Tatsuya Mori, Shigeki Goto |
Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. |
SAINT |
2010 |
DBLP DOI BibTeX RDF |
low-interaction, unused IP address, malware, honeypot |
20 | Julia Narvaez, Chiraag Uday Aval, Barbara Endicott-Popovsky, Christian Seifert, Ashish Malviya, Doug Nordwall |
Assessment of Virtualization as a Sensor Technique. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
virtualization detection, virtual machine, virtualization, malware, honeypot, cyber-security, malware analysis |
20 | Christian Seifert, Peter Komisarczuk, Ian Welch |
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
client honeypot, security, evaluation, intrusion detection |
20 | Seiichiro Mizoguchi, Yoshiaki Hori, Kouichi Sakurai |
Monitoring Unused IP Addresses on Segments Managed by DHCP. |
NCM (1) |
2008 |
DBLP DOI BibTeX RDF |
network security, network monitoring, honeypot, DHCP |
20 | Junfeng Tian, Ning Li |
A New Proactive Defense Model Based on Intrusion Deception and Traceback. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Intrusion deception, Trap environment, Honeypot, Traceback |
20 | M. Shirantha de Silva, David J. Parish, Peter Sandford, Jonathan M. Sandford |
Automated Detection of Emerging Network Security Threats. |
ICN |
2007 |
DBLP DOI BibTeX RDF |
Honey Net, Network Security, Network Management, Network Monitoring, Honeypot, System Security |
20 | Kurniadi Asrigo, Lionel Litty, David Lie |
Using VMM-based sensors to monitor honeypots. |
VEE |
2006 |
DBLP DOI BibTeX RDF |
honeypot monitoring, intrusion detection, IDS, virtual machine monitor |
20 | George Chamales |
The Honeywall CD-ROM. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
honeywall, blackhat, honeypot, hackers, honeynet |
20 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
Using Honeynets to Protect Large Enterprise Networks. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
firewall, honeypot, honeynet |
20 | Jeremiah K. Jones, Gordon W. Romney |
Honeynets: an educational resource for IT security. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
IT educational resource, information technology, honeypot, information assurance, curricula, honeynet, security education |
20 | Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson |
Characteristics of internet background radiation. |
Internet Measurement Conference |
2004 |
DBLP DOI BibTeX RDF |
internet background radiation, network telescope, honeypot |
20 | Bill McCarty |
Botnets: Big and Bigger. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
honeypot, botnet, honeynet |
17 | Fatna El Mendili, Mohammed Fattah, Nisrine Berros, Youness Filaly, Younès El Bouzekri El Idrissi |
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning. |
Int. J. Inf. Sec. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Hironori Uchibori, Katsunari Yoshioka, Kazumasa Omote |
Honeypot Method to Lure Attackers Without Holding Crypto-Assets. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Takayuki Sasaki, Mami Kawaguchi, Takuhiro Kumagai, Katsunari Yoshioka, Tsutomu Matsumoto |
Observation of Human-Operated Accesses Using Remote Management Device Honeypot. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Jianguo Ren, Qiang Zhi |
An Efficient Multiplex Network Model for Effective Honeypot Roaming Against DDoS Attacks. |
IEEE Trans. Netw. Sci. Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Martin Gubri, Dennis Ulmer, Hwaran Lee, Sangdoo Yun, Seong Joon Oh |
TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Wenjun Fan, Zhihui Du, Max Smith-Creasey, David Fernández 0002 |
HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
17 | H. K. Sampada, K. R. Shobha |
Cluster-based multiple malicious node detection using honeypot-AODV in MANETs. |
Int. J. Commun. Networks Distributed Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Yuntao Wang 0004, Zhou Su, Abderrahim Benslimane, Qichao Xu, Minghui Dai, Ruidong Li |
Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Weixiang Ding |
A GAN-based security strategy for WSN networks based on honeypot algorithm. |
Phys. Commun. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Irini Lygerou, Shreyas Srinivasa, Emmanouil Vasilomanolakis, George Stergiopoulos, Dimitris Gritzalis |
Correction to: A decentralized honeypot for IoT Protocols based on Android devices. |
Int. J. Inf. Sec. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Xingyuan Yang, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang, Jinyu Zhao |
A Highly Interactive Honeypot-Based Approach to Network Threat Management. |
Future Internet |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Yao Shan, Yu Yao, Tong Zhao, Wei Yang |
NeuPot: A Neural Network-Based Honeypot for Detecting Cyber Threats in Industrial Control Systems. |
IEEE Trans. Ind. Informatics |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Avijit Mondal, Radha Tamal Goswami |
Ad-hoc networks: new detection and prevention approach to malicious attacks using Honeypot. |
Int. J. Cloud Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Sibi Chakkaravarthy Sethuraman, Tharshith Goud Jadapalli, Devi Priya Vimala Sudhakaran, Saraju P. Mohanty |
Flow based containerized honeypot approach for network traffic analysis: An empirical study. |
Comput. Sci. Rev. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Sai Chaithanya Movva, Suresh Nikudiya, Varsha S. Basanaik, Damodar Reddy Edla, Hanumanthu Bhukya |
Intelligent IDS: Venus Fly-Trap Optimization with Honeypot Approach for Intrusion Detection and Prevention. |
Wirel. Pers. Commun. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Michaela Brunner, Hye-Hyun Lee, Alexander Hepp, Johanna Baehr, Georg Sigl |
Hardware Honeypot: Setting Sequential Reverse Engineering on a Wrong Track. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Rundong Gan, Le Wang, Xiaodong Lin 0001 |
Why Trick Me: The Honeypot Traps on Decentralized Exchanges. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Chongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu, Thomas La Porta |
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Yagmur Yigit, Omer Kemal Kinaci, Trung Q. Duong, Berk Canberk |
TwinPot: Digital Twin-assisted Honeypot for Cyber-Secure Smart Seaports. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Massimiliano Baldo, Tommaso Bianchi, Mauro Conti, Alessio Trevisan, Federico Turrin |
HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Stefan Machmeier |
Honeypot Implementation in a Cloud Environment. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Volviane Saphir Mfogo, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua |
AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 541 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|