<--- Back to Details
First PageDocument Content
Software / Security / Honeyd / Hacker / Xen / Computer security / Virtual machine / Client honeypot / Computer network security / Computing / Honeypot
Date: 2006-11-11 03:37:20
Software
Security
Honeyd
Hacker
Xen
Computer security
Virtual machine
Client honeypot
Computer network security
Computing
Honeypot

Add to Reading List

Source URL: 2009.hack.lu

Download Document from Source Website

File Size: 1,85 MB

Share Document on Facebook

Similar Documents

Crime prevention / Cryptography / Information governance / National security / Computer network security / Digital mailroom / Computer security / Server / F-Secure / FTPS / Client honeypot

OVEANA Global Business Services 123 W. Mills Avenue, Suite 400 El Paso, TXDigital Imaging Servicing Level

DocID: 1pjnK - View Document

Computing / Cyberwarfare / Computer network security / Computer security / Cybercrime / Spamming / Internet security / Zero-day / Phishing / Computer virus / Syslog / Client honeypot

Appliance X1 xorlab AG c/o ETH Zürich Universitätsstrasse 6

DocID: 1nul6 - View Document

Information science / Information retrieval / URL redirection / Cloaking / Malware / JavaScript / Client honeypot / Cross-site scripting / World Wide Web / Computing / Uniform resource locator / Internet

Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara {gianluca, chris, vigna}@cs.ucsb.edu

DocID: 1b1Ew - View Document

Computer security / Antivirus software / Client honeypot / Malware / Rogue software / Gumblar / HoneyMonkey / JavaScript / World Wide Web / Computing / Computer network security / Cyberwarfare

BadSignal-Reputation-bar.eps

DocID: 1aS6A - View Document

Internet / URI schemes / Malware / JavaScript / Webalizer / Client honeypot / World Wide Web / HTTP referer / Spyware / Computing / Espionage / Uniform resource locator

Proceedings of the APAN – Network Research WorkshopAnalysis of Redirection Caused by Web-based Malware Yuta Takata 1,*, Shigeki Goto 1,* and Tatsuya Mori 2 1 Waseda UniversityOkubo, Shinjuku-ku, Tokyo,

DocID: 19Zw7 - View Document