|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 139 occurrences of 75 keywords
|
|
|
Results
Found 332 publication records. Showing 332 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
157 | Sherif M. Khattab, Chatree Sangpachatanaruk, Daniel Mossé, Rami G. Melhem, Taieb Znati |
Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks. |
ICDCS |
2004 |
DBLP DOI BibTeX RDF |
|
127 | Xuxian Jiang, Xinyuan Wang 0005 |
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
106 | Iyatiti Mokube, Michele Adams |
Honeypots: concepts, approaches, and challenges. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
types of honeypots, honeypots, legal issues |
97 | Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval |
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. |
HCI (16) |
2009 |
DBLP DOI BibTeX RDF |
counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks |
96 | Iksu Kim, Myungho Kim |
The DecoyPort: Redirecting Hackers to Honeypots. |
NBiS |
2007 |
DBLP DOI BibTeX RDF |
|
86 | Kyumin Lee, James Caverlee, Steve Webb |
Uncovering social spammers: social honeypots + machine learning. |
SIGIR |
2010 |
DBLP DOI BibTeX RDF |
social honeypots, social media, spam |
81 | Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel 0001 |
Self Adaptive High Interaction Honeypots Driven by Game Theory. |
SSS |
2009 |
DBLP DOI BibTeX RDF |
|
81 | Xinwen Fu, Wei Yu 0002, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham |
On Recognizing Virtual Honeypots and Countermeasures. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
81 | Chi-Hung Chi, Ming Li 0002, Dongxi Liu |
A Method to Obtain Signatures from Honeypots Data. |
NPC |
2004 |
DBLP DOI BibTeX RDF |
|
77 | Cliff Changchun Zou, Ryan Cunningham |
Honeypot-Aware Advanced Botnet Construction and Maintenance. |
DSN |
2006 |
DBLP DOI BibTeX RDF |
|
77 | Robert McGrew 0002, Rayford B. Vaughn |
Experiences with Honeypot Systems: Development, Deployment, and Analysis. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
70 | Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou |
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
Intrusion Detection Systems, Malware, Honeypots |
65 | Kurniadi Asrigo, Lionel Litty, David Lie |
Using VMM-based sensors to monitor honeypots. |
VEE |
2006 |
DBLP DOI BibTeX RDF |
honeypot monitoring, intrusion detection, IDS, virtual machine monitor |
65 | Fabien Pouget, Thorsten Holz |
A Pointillist Approach for Comparing Honeypots. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
65 | Vishal Chowdhary, Alok Tongaonkar, Tzi-cker Chiueh |
Towards Automatic Learning of Valid Services for Honeypots. |
ICDCIT |
2004 |
DBLP DOI BibTeX RDF |
|
65 | Marc Dacier, Fabien Pouget, Hervé Debar |
Honeypots: Practical Means to Validate Malicious Fault Assumptions. |
PRDC |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Simon P. Chung, Aloysius K. Mok |
Collaborative Intrusion Prevention. |
WETICE |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang |
HonIDS: Enhancing Honeypot System with Intrusion Detection Models. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Takashi Minohara, Satoshi Ishikawa, Masahiro Amano |
Centralized Surveillance of Unused Address Space by using Virtual Networks. |
PRDC |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Christian Seifert, Ian Welch, Peter Komisarczuk |
Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
client honeypots, security, algorithms, intrusion detection, performance improvement |
51 | Jon Oberheide, Manish Karir, Zhuoqing Morley Mao |
Characterizing Dark DNS Behavior. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
darknets, sensors, honeypots, DNS, reconnaissance |
50 | David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen |
HoneyStat: Local Worm Detection Using Honeypots. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Christian Seifert, Ian Welch, Peter Komisarczuk, Chiraag Uday Aval, Barbara Endicott-Popovsky |
Identification of malicious web pages through analysis of underlying DNS and web server relationships. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Mark S. Withall, M. Shirantha de Silva, David J. Parish, Iain Phillips 0002 |
Honey Plotter and the Web of Terror. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Neil C. Rowe |
Measuring the Effectiveness of Honeypot Counter-Counterdeception. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Iyad Kuwatly, Malek Sraj, Zaid Al Masri, Hassan Artail |
A Dynamic Honeypot Design for Intrusion Detection. |
ICPS |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Christian Kreibich, Jon Crowcroft |
Honeycomb: creating intrusion detection signatures using honeypots. |
Comput. Commun. Rev. |
2004 |
DBLP DOI BibTeX RDF |
longest-common-substring algorithms, traffic signatures, suffix trees, honeypots, network intrusion detection, protocol analysis, pattern detection |
40 | Lawrence Teo, Yu-An Sun, Gail-Joon Ahn |
Defeating Internet Attacks Using Risk Awareness and Active Honeypots. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
Japonica, Risk Awareness, Honeypots, Colored Petri Nets |
38 | Nitin Naik, Paul Jenkins, Roger Cooke, Longzhi Yang |
Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots. |
FUZZ-IEEE |
2018 |
DBLP DOI BibTeX RDF |
|
38 | Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas |
HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
36 | Anjali Sardana, Ramesh Chandra Joshi |
Dual-level defense for networks under DDoS attacks. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
entropy, detection, DDoS, Honeypots, characterization |
36 | Kyumin Lee, James Caverlee, Steve Webb |
The social honeypot project: protecting online communities from spammers. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
social honeypots, social media, spam |
36 | Christian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch |
Identifying and Analyzing Web Server Attacks. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2008 |
DBLP DOI BibTeX RDF |
malicious web servers, client honeypots, Network forensics |
36 | Wilfried N. Gansterer, Michael Ilger |
Analyzing UCE/UBE traffic. |
ICEC |
2007 |
DBLP DOI BibTeX RDF |
UBE, e-mail traffic, spam, honeypots, UCE |
36 | Asia Slowinska, Herbert Bos |
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
attack analysis, honeypots, intrusion detection and prevention |
36 | Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
Security, Honeypots, Forensics, Honeynets |
36 | Neal Krawetz |
Anti-Honeypot Technology. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
spam, honeypots, honeynets, trackers |
36 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics, Part II: Analyzing the Compromised Host. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
network analysis, honeypots, honeynets |
36 | Vinod Yegneswaran, Paul Barford, David Plonka |
On the Design and Use of Internet Sinks for Network Abuse Monitoring. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
Deception Systems, Intrusion Detection, Honeypots |
35 | Kevin D. Fairbanks, Ying H. Xia, Henry L. Owen III |
A Method for Historical Ext3 Inode to Filename Translation on Honeypots. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Oussama Allali, Matthieu Latapy, Clémence Magnien |
Measurement of eDonkey activity with distributed honeypots. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Corrado Leita, Marc Dacier, Frédéric Massicotte |
Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Richard Stevens, Hartmut Pohl |
Honeypots und Honeynets. |
Inform. Spektrum |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Anjali Sardana, Ramesh Chandra Joshi |
Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level. |
ISIP |
2008 |
DBLP DOI BibTeX RDF |
Routing, DDoS, Honeypot |
31 | Anjali Sardana, Ramesh Chandra Joshi |
Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Huidong Jin 0001, Olivier Y. de Vel, Ke Zhang, Nianjun Liu |
Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks. |
Australasian Conference on Artificial Intelligence |
2008 |
DBLP DOI BibTeX RDF |
density-based cluster visualisation, honeypot data, Knowledge discovery, outlier detection, botnet, Internet security |
31 | Anjali Sardana, Ramesh Chandra Joshi |
Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Sherif M. Khattab, Rami G. Melhem, Daniel Mossé, Taieb Znati |
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Michael Vrable, Justin Ma, Jay Chen, David Moore 0001, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage |
Scalability, fidelity, and containment in the potemkin virtual honeyfarm. |
SOSP |
2005 |
DBLP DOI BibTeX RDF |
honeyfarm, malware, honeypot, virtual machine monitor, copy-on-write |
31 | Phillip Pudney, Jill Slay |
An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun 0001 |
Real-Time Emulation of Intrusion Victim in HoneyFarm. |
AWCC |
2004 |
DBLP DOI BibTeX RDF |
interception proxy, reverse firewall, Honeypot, intrusion |
20 | Anjali Sardana, Ramesh Chandra Joshi |
Dual-Level Attack Detection and Characterization for Networks under DDoS. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Entropy, Detection, Distributed Denial of Service, Honeypots |
20 | Jesus Molina, Michel Cukier |
Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. |
NCA |
2009 |
DBLP DOI BibTeX RDF |
filesystem data, attacker behavior, SSH compromise, Intrusion detection systems, honeypots, empirical analysis |
20 | Saleh I. Almotairi, Andrew J. Clark, George M. Mohay, Jacob Zimmermann |
Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
Internet traffic characterization, principal component analysis, traffic analysis, honeypots |
20 | Urko Zurutuza, Roberto Uribeetxeberria, Diego Zamboni |
A data mining approach for analysis of worm activity through automatic signature generation. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
automatic signature generation, malware identification, data mining, intrusion detection, honeypots |
20 | Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier |
Automating the Analysis of Honeypot Data (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Internet threats analysis, malicious behavior characterization, Honeypots |
20 | Georgios Portokalidis, Herbert Bos |
Eudaemon: involuntary and on-demand emulation against zero-day exploits. |
EuroSys |
2008 |
DBLP DOI BibTeX RDF |
security, operating systems, honeypots |
20 | John R. Lange, Peter A. Dinda, Fabián E. Bustamante |
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
volunteer systems, honeypots, honeynets, wormholes |
20 | Jan Goebel, Thorsten Holz, Carsten Willems |
Measurement and Analysis of Autonomous Spreading Malware in a University Environment. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
Malware, Honeypots, Invasive Software |
20 | Stelios Sidiroglou, Angelos D. Keromytis |
Countering Network Worms Through Automatic Patch Generation. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
software patching, process sandboxing, Worms, buffer overflows, honeypots, viruses, memory protection |
20 | Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms |
20 | Shiva Azadegan, Vanessa McKenna |
Use of Honeynets in Computer Security Education. |
ACIS-ICIS |
2005 |
DBLP DOI BibTeX RDF |
Computer Security, Honeypots, Honeynets, Security Education |
20 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics Part I: Analyzing the Network. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
blackhat, honeypots, honeynets |
20 | Lance Spitzner |
The Honeynet Project: Trapping the Hackers. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
Honeynet Project, early warning and prediction, distributed honeynets, Honeypots, information gathering, honeynets |
19 | Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu, Lin Chen 0009 |
Optimally Blending Honeypots into Production Networks: Hardness and Algorithms. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Pedro Beltran Lopez, Pantaleone Nespoli, Manuel Gil Pérez |
Cyber Deception Reactive: TCP Stealth Redirection to On-Demand Honeypots. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut, Marianne Azer |
Analysis of ICS and SCADA Systems Attacks Using Honeypots. |
Future Internet |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Jarrod Ragsdale, Rajendra V. Boppana |
On Designing Low-Risk Honeypots Using Generative Pre-Trained Transformer Models With Curated Inputs. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Veronica Valeros, Maria Rigaki, Sebastian García |
Attacker Profiling Through Analysis of Attack Patterns in Geographically Distributed Honeypots. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Ruixiang Tang, Jiayi Yuan, Yiming Li, Zirui Liu, Rui Chen, Xia Hu 0001 |
Setting the Trap: Capturing and Defeating Backdoors in Pretrained Language Models through Honeypots. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch |
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Jason M. Pittman, Shaho Alaee |
To What Extent Are Honeypots and Honeynets Autonomic Computing Systems? |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Muris Sladic, Veronica Valeros, Carlos Adrián Catania, Sebastian García |
LLM in the Shell: Generative Honeypots. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Daniel Zielinski, Hisham A. Kholidy |
An Analysis of Honeypots and their Impact as a Cyber Deception Tactic. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Niclas Ilg, Paul Duplys, Dominik Sisejkovic, Michael Menth |
A survey of contemporary open-source honeypots, frameworks, and tools. |
J. Netw. Comput. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Naya Nagy, Marius Nagy, Ghadeer Alazman, Zahra Hawaidi, Saja Mustafa Alsulaibikh, Layla Alabbad, Sadeem Alfaleh, Areej Aljuaid |
Quantum Honeypots. |
Entropy |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Maria Nintsiou, Elisavet Grigoriou, Paris-Alexandros Karypidis, Theocharis Saoulidis, Eleftherios Fountoukidis, Panagiotis G. Sarigiannidis |
Threat intelligence using Digital Twin honeypots in Cybersecurity. |
CSR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Pierre-Marie Junges, Jérôme François, Olivier Festor |
HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots. |
NOMS |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Yogesh C. Jadhav, Arjun Sable, Maithri Suresh, Manjesh K. Hanawal |
Securing Containers: Honeypots for Analysing Container Attacks. |
COMSNETS |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Javier Franco, Abbas Acar, Ahmet Aris, A. Selcuk Uluagac |
Forensic Analysis of Cryptojacking in Host-Based Docker Containers Using Honeypots. |
ICC |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Stash Kempinski, Shuaib Ichaarine, Savio Sciancalepore, Emmanuele Zambon |
ICSvertase: A Framework for Purpose-based Design and Classification of ICS Honeypots. |
ARES |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu, Lin Chen 0009 |
Optimally Blending Honeypots into Production Networks: Hardness and Algorithms. |
SciSec |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Mahtab Norouzi, Mounir Elgharabawy, Kaiwen Zhang 0001 |
The Greed Trap: Uncovering Intrinsic Ethereum Honeypots Through Symbolic Execution. |
BCCA |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch |
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. |
EuroS&P |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Joseph T. Meier, Thuy D. Nguyen, Neil C. Rowe |
Hardening Honeypots for Industrial Control Systems. |
HICSS |
2023 |
DBLP BibTeX RDF |
|
19 | Ruixiang (Ryan) Tang, Jiayi Yuan, Yiming Li, Zirui Liu, Rui Chen, Xia Hu 0001 |
Setting the Trap: Capturing and Defeating Backdoors in Pretrained Language Models through Honeypots. |
NeurIPS |
2023 |
DBLP BibTeX RDF |
|
19 | Huy Quang Ngo, Mingyu Guo, Hung Nguyen 0004 |
Near Optimal Strategies for Honeypots Placement in Dynamic and Large Active Directory Networks. |
AAMAS |
2023 |
DBLP BibTeX RDF |
|
19 | Joel Scanlan, Paul A. Watters, Jeremy Prichard, Charlotte Hunn, Caroline Spiranovic, Richard Wortley |
Creating Honeypots to Prevent Online Child Exploitation. |
Future Internet |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Razvan Florea, Mitica Craus |
A Game-Theoretic Approach for Network Security Using Honeypots. |
Future Internet |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Selvakumar Veluchamy, Ruba Soundar Kathavarayan |
Deep reinforcement learning for building honeypots against runtime DoS attack. |
Int. J. Intell. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Christos Alexakos, Kristina Livitckaia, Mike Anastasiadis, Dimitrios Serpanos |
Identifying Attack Propagation Threads and Root Cause in Internet-of-Vehicle Ecosystems Utilising Honeypots in Connected Autonomous Vehicles. |
ERCIM News |
2022 |
DBLP BibTeX RDF |
|
19 | Huanran Wang, Hui He, Weizhe Zhang, Wenmao Liu, Peng Liu 0005, Amir Javadpour |
Using honeypots to model botnet attacks on the internet of medical things. |
Comput. Electr. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler J. Shipp, Patrick D. McDaniel |
HoneyModels: Machine Learning Honeypots. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
19 | Upendra Bartwal, Subhasis Mukhopadhyay, Rohit Negi, Sandeep K. Shukla |
Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
19 | Suhyeon Lee 0001, Kwangsoo Cho, Seungjoo Kim |
Do You Really Need to Disguise Normal Servers as Honeypots? |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Zain Shamsi, Daniel Zhang, Daehyun Kyoung, Alex Liu |
Measuring and Clustering Network Attackers using Medium-Interaction Honeypots. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Sam Maesschalck, Vasileios Giotsas, Benjamin Green 0001, Nicholas J. P. Race |
Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Elisavet Grigoriou, Athanasios Liatifis, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Ioannis D. Moscholios, Evangelos K. Markakis, Panagiotis G. Sarigiannidis |
Protecting IEC 60870-5-104 ICS/SCADA Systems with Honeypots. |
CSR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Rakshit Agrawal, Jack W. Stokes, Lukas Rist, Ryan Littlefield, Xun Fan, Ken Hollis, Zane Coppedge, Noah Chesterman, Christian Seifert |
Long-Term Study of Honeypots in a Public Cloud. |
DSN (Supplements) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Nizar Kheir, Loay Abdelrazek, Daniel Cho 0001 |
Demo Paper: Caught in my Radio Net - Experiment with Honeypots in Radio Access Networks. |
ICIN |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 332 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|