Client honeypot

Results: 68



#Item
1OVEANA Global Business Services 123 W. Mills Avenue, Suite 400 El Paso, TXDigital Imaging Servicing Level

OVEANA Global Business Services 123 W. Mills Avenue, Suite 400 El Paso, TXDigital Imaging Servicing Level

Add to Reading List

Source URL: www.ccg.state.tx.us

Language: English - Date: 2014-08-25 16:38:45
2Appliance X1  xorlab AG c/o ETH Zürich  Universitätsstrasse 6

Appliance X1 xorlab AG c/o ETH Zürich Universitätsstrasse 6

Add to Reading List

Source URL: www.xorlab.com

Language: English - Date: 2016-03-11 01:09:00
3Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara {gianluca, chris, vigna}@cs.ucsb.edu

Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara {gianluca, chris, vigna}@cs.ucsb.edu

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-02 09:17:33
4BadSignal-Reputation-bar.eps

BadSignal-Reputation-bar.eps

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2015-05-25 21:19:32
5Proceedings of the APAN – Network Research WorkshopAnalysis of Redirection Caused by Web-based Malware Yuta Takata 1,*, Shigeki Goto 1,* and Tatsuya Mori 2 1 Waseda UniversityOkubo, Shinjuku-ku, Tokyo,

Proceedings of the APAN – Network Research WorkshopAnalysis of Redirection Caused by Web-based Malware Yuta Takata 1,*, Shigeki Goto 1,* and Tatsuya Mori 2 1 Waseda UniversityOkubo, Shinjuku-ku, Tokyo,

Add to Reading List

Source URL: nsl.cs.waseda.ac.jp

Language: English - Date: 2011-12-23 02:37:56
6Security Analysis of the Estonian Internet Voting System J. Alex Halderman1 Harri Hursti Jason Kitcat2 Margaret MacAlpine Travis Finkenauer1 Drew Springall1 1 University  of Michigan, Ann Arbor, MI, U.S.A.

Security Analysis of the Estonian Internet Voting System J. Alex Halderman1 Harri Hursti Jason Kitcat2 Margaret MacAlpine Travis Finkenauer1 Drew Springall1 1 University of Michigan, Ann Arbor, MI, U.S.A.

Add to Reading List

Source URL: www.verifiedvoting.org

Language: English - Date: 2014-10-07 12:28:22
7SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE  A European Network of Excellence in Managing Threats and

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE A European Network of Excellence in Managing Threats and

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-14 13:46:14
8Rozzle: De-Cloaking Internet Malware Clemens Kolbitsch Benjamin Livshits and Benjamin Zorn  Christian Seifert

Rozzle: De-Cloaking Internet Malware Clemens Kolbitsch Benjamin Livshits and Benjamin Zorn Christian Seifert

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-03-06 19:36:00
9SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-11-22 12:15:00
10Security Analytics Project: Alternatives in Analysis Mark Ryan del Moral Talabis Secure-DNA Contents I.

Security Analytics Project: Alternatives in Analysis Mark Ryan del Moral Talabis Secure-DNA Contents I.

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37