First Page | Document Content | |
---|---|---|
![]() Date: 2013-07-23 10:38:41Computing Honeypot Client honeypot Computer network security Cyberwarfare Computer security | Add to Reading List |
![]() | OVEANA Global Business Services 123 W. Mills Avenue, Suite 400 El Paso, TXDigital Imaging Servicing LevelDocID: 1pjnK - View Document |
![]() | Appliance X1 xorlab AG c/o ETH Zürich Universitätsstrasse 6DocID: 1nul6 - View Document |
![]() | Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara {gianluca, chris, vigna}@cs.ucsb.eduDocID: 1b1Ew - View Document |
![]() | BadSignal-Reputation-bar.epsDocID: 1aS6A - View Document |
![]() | Proceedings of the APAN – Network Research WorkshopAnalysis of Redirection Caused by Web-based Malware Yuta Takata 1,*, Shigeki Goto 1,* and Tatsuya Mori 2 1 Waseda UniversityOkubo, Shinjuku-ku, Tokyo,DocID: 19Zw7 - View Document |