Client honeypot

Results: 68



#Item
31Internet standards / Computer network security / Internet protocols / Honeypot / Spamming / Transmission Control Protocol / IPv4 / IPv6 / Netflow / Network architecture / Internet / Computing

TLP:WHITE - HoneyBot Services HoneyBot Services - Client Data Collection Team CIRCL∗ 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy of Luxembourg

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2014-03-28 07:10:33
32Electronic commerce / Information appliances / Computing / Computer security / Client honeypot / Network security / Honeypot / Erol Gelenbe / Random neural network / Technology / Computer network security / Mobile technology

NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem Erol Gelenbe, G¨okc¸e G¨orbil, Dimitrios Tzovaras, Steffen Liebergeld, David Garcia, Madalina Baltatu and George Lyber

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2013-07-02 11:36:43
33Mobile technology / Computer network security / Spamming / Information appliances / Computer security / Network security / Malware / Client honeypot / Erol Gelenbe / Technology / Mobile telecommunications / Computing

Security for Smart Mobile Networks: The NEMESYS Approach Erol Gelenbe∗ , Gokce Gorbil∗ , Dimitrios Tzovaras† , Steffen Liebergeld‡ , David Garcia§ , Madalina Baltatu¶ and George Lyberopoulosk ∗ Imperial

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2013-10-23 08:34:01
34Computing / Honeypot / Remote file inclusion / Vulnerability / Denial-of-service attack / Exploit / Hacker / Malware / Client honeypot / Computer network security / Cyberwarfare / Computer security

T H E H O N E Y N E T P R O J E C T ® | KYT Paper Know Your Tools: A dynamic, low-interaction web application honeypot The Honeynet Project

Add to Reading List

Source URL: www.honeynet.org

Language: English - Date: 2014-01-06 14:17:05
35Internet standards / Computer network security / Internet protocols / Honeypot / Spamming / Transmission Control Protocol / IPv4 / IPv6 / Netflow / Network architecture / Internet / Computing

TLP:WHITE - HoneyBot Services HoneyBot Services - Client Data Collection Team CIRCL∗ 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy of Luxembourg

Add to Reading List

Source URL: circl.lu

Language: English - Date: 2014-03-28 07:10:33
36Computing / Client honeypot / Honeypot / Malware / Spyware / HoneyMonkey / Honeyd / Threat / Adware / Computer network security / Cyberwarfare / Computer security

2nd Generation Honeyclients Robert Danford SANS Internet Storm Center Research funded in part with a grant from StillSecure (http://www.stillsecure.com) Author can be reached at:

Add to Reading List

Source URL: handlers.dshield.org

Language: English - Date: 2009-09-30 11:18:14
37Malware / Red pill and blue pill / VM / JavaScript / Honeypot / Client honeypot / System software / Software / Computing

Tick Tock: Building Browser Red Pills from Timing Side Channels Grant Ho, Dan Boneh Stanford and

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-11-11 15:48:32
38Advertising / Malware / Computer network security / Rogue software / Internet fraud / Online advertising / Malvertising / Click fraud / Client honeypot / Internet / Computing / System software

The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements Apostolis Zarras Alexandros Kapravelos

Add to Reading List

Source URL: cs.ucsb.edu

Language: English - Date: 2014-09-15 13:22:30
39Advertising / Malware / Computer network security / Rogue software / Internet fraud / Online advertising / Malvertising / Click fraud / Client honeypot / Internet / Computing / System software

The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements Apostolis Zarras Alexandros Kapravelos

Add to Reading List

Source URL: syssec.rub.de

Language: English - Date: 2014-09-02 15:36:47
40Computing / Malware / Phishing / World Wide Web / Web threat / Client honeypot / Antivirus software / Cloud computing / Software

Light Point Security Light Point Web: Malware-Free Web Browsing Key Benefits Traditional security solutions rely on a filter or signature to decide what is safe and what

Add to Reading List

Source URL: lightpointsecurity.com

Language: English - Date: 2013-02-04 14:51:18
UPDATE