Anagnostakis

Results: 14



#Item
11Spamming / Internet / Internet privacy / Honeypot / Data security / Computer security / Proxy server / Web server / HTTP cookie / Computing / Computer network security / Software

Detecting Targeted Attacks Using Shadow Honeypots K. G. Anagnostakis†, S. Sidiroglou‡, P. Akritidis?, K. Xinidis?, E. Markatos? , A. D. Keromytis‡ † CIS Department, Univ. of Pennsylvania

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-07-14 03:59:29
12Internet privacy / Network architecture / Spamming / Networking hardware / Honeypot / Internet standards / Honeyd / Network security / Tor / Computer network security / Computing / Internet

Honey@home: A New Approach to Large-Scale Threat Monitoring S. Antonatos, E. P. Markatos K. G. Anagnostakis

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-09-27 10:07:13
13Spamming / Internet / Internet privacy / Honeypot / Computer security / Data security / Proxy server / Buffer overflow / Web server / Computing / Computer network security / Software

Detecting Targeted Attacks Using Shadow Honeypots K. G. Anagnostakis† , S. Sidiroglou‡ , P. Akritidis? , K. Xinidis?, E. Markatos? , A. D. Keromytis‡ † CIS Department, Univ. of Pennsylvania [removed]n

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2005-05-17 14:49:41
14Anagnostakis

PDF Document

Add to Reading List

Source URL: www.lsa.umich.edu

Language: English - Date: 2011-07-28 22:40:39
    UPDATE