|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7 occurrences of 4 keywords
|
|
|
Results
Found 12 publication records. Showing 12 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
55 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics Part I: Analyzing the Network. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
blackhat, honeypots, honeynets |
40 | Hao Yang, Kun Du, Yubao Zhang, Shuai Hao 0001, Haining Wang, Jia Zhang 0004, Haixin Duan |
Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO. |
ESORICS (1) |
2021 |
DBLP DOI BibTeX RDF |
|
40 | Kun Du, Hao Yang, Zhou Li 0001, Hai-Xin Duan, Kehuan Zhang |
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO. |
USENIX Security Symposium |
2016 |
DBLP BibTeX RDF |
|
40 | Suen Yek |
Blackhat fingerprinting of the wired and wireless honeynet. |
Australian Computer, Network & Information Forensics Conference |
2005 |
DBLP BibTeX RDF |
|
31 | Eric Rescorla |
Is Finding Security Holes a Good Idea? |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
blackhat, whitehat, software patches, vulnerability disclosure |
31 | George Chamales |
The Honeywall CD-ROM. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
honeywall, blackhat, honeypot, hackers, honeynet |
24 | Linda Wilbanks |
When Black Hats Are Really White. |
IT Prof. |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra |
SilentKnock: Practical, Provably Undetectable Authentication. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Fernando C. Colón Osorio, Zachi Klopman |
And you though you were safe after SLAMMER, not so, swarms not Zombies present the greatest risk to our national Internet infrastructure. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Kevin Curran, Colman Morrissey, Colm Fagan, Colm Murphy, Brian O'Donnell, Gerry Fitzpatrick, Stephen Condit |
Monitoring hacker activity with a Honeynet. |
Int. J. Netw. Manag. |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Iyad Kuwatly, Malek Sraj, Zaid Al Masri, Hassan Artail |
A Dynamic Honeypot Design for Intrusion Detection. |
ICPS |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Bill McCarty |
The Honeynet Arms Race. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
data-capture tools, honeynets, data capture |
Displaying result #1 - #12 of 12 (100 per page; Change: )
|
|