Client honeypot

Results: 68



#Item
21            The NoAH approach to              zero­day worm detection Asia Slowinska  Vrije Universiteit, Amsterdam

            The NoAH approach to              zero­day worm detection Asia Slowinska  Vrije Universiteit, Amsterdam

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-10-31 10:22:20
22SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE  A European Network of Excellence in Managing Threats and

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE A European Network of Excellence in Managing Threats and

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2013-02-13 05:09:51
23SIXTH FRAMEWORK PROGRAMME  Structuring the European Research Area Specific Programme  RESEARCH INFRASTRUCTURES ACTION

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-07-14 04:02:35
24SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-11-01 11:35:42
25Microsoft Word - surveys_diffs.doc

Microsoft Word - surveys_diffs.doc

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-04-04 11:41:11
26WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios Kevin Zhijie Chen Guofei Gu

WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios Kevin Zhijie Chen Guofei Gu

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2012-12-11 01:17:01
27The Ghost In The Browser Analysis of Web-based Malware Niels Provos Dean McNamee Panayiotis Mavrommatis Ke Wang

The Ghost In The Browser Analysis of Web-based Malware Niels Provos Dean McNamee Panayiotis Mavrommatis Ke Wang

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2007-06-27 02:56:22
28HONEYPOT SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region  The contents of this document remain the property of, and may not be

HONEYPOT SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2009-06-15 09:06:18
29Microsoft Word - ACIC-first.doc

Microsoft Word - ACIC-first.doc

Add to Reading List

Source URL: www.wseas.us

Language: English - Date: 2013-07-23 10:38:41
30HONEYPOT SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region  The contents of this document remain the property of, and may not be

HONEYPOT SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:29:47