Client honeypot

Results: 68



#Item
21Honeypot / Cyberwarfare / Vrije / Computer worm / Computer security / Human geography / Client honeypot / Computer network security / Spamming / Security

            The NoAH approach to              zero­day worm detection Asia Slowinska  Vrije Universiteit, Amsterdam

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-10-31 10:22:20
22Cyberwarfare / Antivirus software / Honeypot / Computing / Malware / Computer virus / Internet privacy / Threat / Client honeypot / Computer network security / Computer security / Spamming

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE A European Network of Excellence in Managing Threats and

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2013-02-13 05:09:51
23Computing / Computer security / Honeyd / User-mode Linux / Denial-of-service attack / Virtual private network / Client honeypot / Computer network security / Cyberwarfare / Honeypot

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-07-14 04:02:35
24Cyberwarfare / Security / Honeypot / Spamming / Buffer overflow / Stack buffer overflow / Heap overflow / Computer security / Client honeypot / Computer network security / Software bugs / Computing

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-11-01 11:35:42
25Evaluation methods / Research methods / Honeypot / Statistics / Espionage / Questionnaire / Clandestine HUMINT asset recruiting / Survey methodology / Client honeypot / Computer network security / Spamming / Science

Microsoft Word - surveys_diffs.doc

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-04-04 11:41:11
26Computing / Antivirus software / Client honeypot / Malware / HoneyMonkey / Shellcode / Honeypot / Microsoft Security Essentials / Threat / Computer network security / Cyberwarfare / Computer security

WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios Kevin Zhijie Chen Guofei Gu

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2012-12-11 01:17:01
27Niels Provos / JavaScript / URL redirection / Client honeypot / Google Chrome / Software / Computing / Malware

The Ghost In The Browser Analysis of Web-based Malware Niels Provos Dean McNamee Panayiotis Mavrommatis Ke Wang

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2007-06-27 02:56:22
28Computing / Honeyd / Client honeypot / Email address harvesting / Honeynet Project / Computer security / Decoy / Computer network security / Honeypot / Security

HONEYPOT SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2009-06-15 09:06:18
29Computing / Honeypot / Client honeypot / Computer network security / Cyberwarfare / Computer security

Microsoft Word - ACIC-first.doc

Add to Reading List

Source URL: www.wseas.us

Language: English - Date: 2013-07-23 10:38:41
30Computing / Honeyd / Client honeypot / Email address harvesting / Honeynet Project / Computer security / Decoy / Computer network security / Honeypot / Security

HONEYPOT SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:29:47
UPDATE