First Page | Document Content | |
---|---|---|
![]() Date: 2012-04-01 20:13:23Computer security Antivirus software Client honeypot Malware Rogue software Gumblar HoneyMonkey JavaScript World Wide Web Computing Computer network security Cyberwarfare | Add to Reading List |
![]() | Microsoft Word - Strider_HoneyMonkey_NDSS2006_2-column_Camera_Ready.docDocID: 1exSE - View Document |
![]() | BadSignal-Reputation-bar.epsDocID: 1aS6A - View Document |
![]() | WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios Kevin Zhijie Chen Guofei GuDocID: 11wdB - View Document |
![]() | Microsoft Word - Strider_HoneyMonkey_NDSS2006_2-column_Camera_Ready.docDocID: Xht7 - View Document |
![]() | 2nd Generation Honeyclients Robert Danford SANS Internet Storm Center Research funded in part with a grant from StillSecure (http://www.stillsecure.com) Author can be reached at:DocID: PecZ - View Document |