Client honeypot

Results: 68



#Item
41Computing / Malware / Antivirus software / Client honeypot / Cross-site scripting / Computer virus / Botnet / Tencent QQ / HoneyMonkey / Cyberwarfare / Computer security / Computer network security

Studying Malicious Websites and the Underground Economy on the Chinese Web Jianwei Zhuge1 , Thorsten Holz2 , Chengyu Song1 , Jinpeng Guo1 , Xinhui Han1 , and Wei Zou1 1

Add to Reading List

Source URL: weis2008.econinfosec.org

Language: English - Date: 2008-05-14 10:00:30
42World Wide Web / Session / Origin / Proprietary software / Web hosting service / Internet Relay Chat / Internet hosting service / Client honeypot / Web application / Computing / Internet / Software licenses

Web Services LLC Software License, Website Production, &Web Hosting Service Agreement READ THESE TERMS CAREFULLY BEFORE INITIATING BUSINESS AND/OR INSTRUCTING DEPLOYMENT OF YOUR WEBSITE WITH US. IF YOU DO NOT AGREE TO TH

Add to Reading List

Source URL: webservices.us.com

Language: English - Date: 2014-03-19 16:26:25
43Malware / Blacklist / World Wide Web / Computer virus / Computing / Contemporary history / Humanities / Computer security / Antivirus software / Client honeypot

Improving Malicious URL Re-Evaluation Scheduling Through an Empirical Study of Malware Download Centers Kyle Zeeuwen Matei Ripeanu

Add to Reading List

Source URL: www.dl.kuis.kyoto-u.ac.jp

Language: English - Date: 2012-04-10 20:33:04
44Client honeypot / Computer security

Improving  Malicious  URL                                    Re-­‐Evalua7on  Scheduling  Through  an   Empirical  Study  of  Malware

Add to Reading List

Source URL: www.dl.kuis.kyoto-u.ac.jp

Language: English - Date: 2011-04-15 01:01:41
45Computer security / Antivirus software / Client honeypot / Malware / Rogue software / Gumblar / HoneyMonkey / JavaScript / World Wide Web / Computing / Computer network security / Cyberwarfare

BadSignal-Reputation-bar.eps

Add to Reading List

Source URL: static.googleusercontent.com

Language: English - Date: 2012-04-01 20:13:23
46Software / Honeypot / Snort / IP address / Honeyd / Dynamic Host Configuration Protocol / Intrusion detection system / Client honeypot / Computer network security / Computing / System software

Research in Honeypot Technologies Karl Schuttler (E00921961) Eastern Michigan University College of Technology 1. Introduction The proposed research project serves to act as a practical, real-world lab on the use of exi

Add to Reading List

Source URL: www.emich.edu

Language: English - Date: 2012-02-23 14:57:36
47Honeypot / Spamming / Gzip / Firefox / Gecko / DEFLATE / Malware / Wget / Client honeypot / Software / Cross-platform software / Computer network security

The German Honeynet Project A short overview Thorsten Holz & Markus Koetter UNIVERSITÄT

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2006-01-25 04:53:11
48Honeypot / Cyberwarfare / Vrije / Computer worm / Computer security / Human geography / Client honeypot / Computer network security / Spamming / Security

            The NoAH approach to              zero­day worm detection Asia Slowinska  Vrije Universiteit, Amsterdam

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2006-10-26 05:42:48
49Computer security / Client honeypot / System software / Client-side / Honeypot / Client / HoneyMonkey / Exploit / X Window System / Computer network security / Software / Computing

Analyse & Benchmarking

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2008-09-27 07:10:54
50Honeypot / Noah / Client honeypot / Computer network security / Carnegie Mellon University / Computer emergency response team

NoAH Honeynet Project 17th TF-CSIRT Event[removed]January 2006 DFN-CERT Services GmbH

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2006-01-25 04:53:30
UPDATE