Client honeypot

Results: 68



#Item
51Internet standards / Computer network security / Internet protocols / Honeypot / Spamming / Transmission Control Protocol / IPv4 / IPv6 / Netflow / Network architecture / Internet / Computing

TLP:WHITE - HoneyBot Services HoneyBot Services - Client Data Collection Team CIRCL∗ 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy of Luxembourg

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2014-03-28 07:10:33
52Software / Security / Honeyd / Hacker / Xen / Computer security / Virtual machine / Client honeypot / Computer network security / Computing / Honeypot

PDF Document

Add to Reading List

Source URL: 2009.hack.lu

Language: English - Date: 2006-11-11 03:37:20
53Computing / Multi-agent systems / Client honeypot / Botnet / Honeypot / Malware / Network security / Philippine Honeynet Project / Computer network security / Spamming / Honeynet Project

THE HONEYNET PROJECT[removed]HONEYNET PROJEC T WORK SHOP SPONSORSHIP OPPORTUNITIES[removed]MAY 2014 | WARSAW

Add to Reading List

Source URL: warsaw2014.honeynet.org

Language: English - Date: 2014-02-12 05:44:18
54Honeyd / Computing / Computer security / User-mode Linux / Human geography / Client honeypot / Computer network security / Honeypot / Security

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-11-03 10:42:29
55Security / Honeypot / Network security / Computer insecurity / Vulnerability / Malware / Client honeypot / HoneyMonkey / Computer network security / Cyberwarfare / Computer security

Project Partners The NoAH project involves eight partners from the academic, research and commercial sectors and represents a total investment of almost 2.5 million euro, 60% of which is funded by the Research Infrastruc

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-05-14 06:31:40
56Computing / Computer security / Client honeypot / Security / Honeypot / X Window System / Client / Eudaemon / Computer network security / Spamming / Software

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS[removed]

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-11-01 19:48:23
57News aggregators / Internet Explorer / Google Chrome / Spyware / Client honeypot / Firefox / Web browser / Internet Explorer 8 / Phishing / Software / Malware / Computer security

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections Long Lu† † Vinod Yegneswaran‡

Add to Reading List

Source URL: www.blade-defender.org

Language: English - Date: 2010-08-24 19:07:12
58SQL / Computer network security / Honeypot / Spamming / SQL injection / Client honeypot / Vulnerability / Stored procedure / Remote file inclusion / Computing / Data management / Cyberwarfare

Cyber Fast Track: Web Application Honeypot Final Report Author: Honeynet Project Date: July 27, 2012

Add to Reading List

Source URL: honeynet.org

Language: English - Date: 2012-09-08 00:15:52
59Computer security / Malware / Internet security / JavaScript / Client honeypot / Stack buffer overflow / Computer network security / Computing / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.checkpoint.com

Language: English - Date: 2004-09-08 13:49:16
60System software / Electronic voting / Information society / Malware / Botnet / Server / X Window System / Internet Relay Chat / Client honeypot / Computing / Software / Computer network security

Security Analysis of the Estonian Internet Voting System J. Alex Halderman1 Harri Hursti Jason Kitcat2 Margaret MacAlpine Travis Finkenauer1 Drew Springall1 1 University of Michigan, Ann Arbor, MI, U.S.A.

Add to Reading List

Source URL: estoniaevoting.org

Language: English - Date: 2014-05-17 16:06:45
UPDATE