HoneyMonkey

Results: 11



#Item
1

Microsoft Word - Strider_HoneyMonkey_NDSS2006_2-column_Camera_Ready.doc

Add to Reading List

Source URL: research.microsoft.com

- Date: 2005-11-20 13:00:06
    2Computer security / Antivirus software / Client honeypot / Malware / Rogue software / Gumblar / HoneyMonkey / JavaScript / World Wide Web / Computing / Computer network security / Cyberwarfare

    BadSignal-Reputation-bar.eps

    Add to Reading List

    Source URL: people.csail.mit.edu

    Language: English - Date: 2015-05-25 21:19:32
    3Computing / Antivirus software / Client honeypot / Malware / HoneyMonkey / Shellcode / Honeypot / Microsoft Security Essentials / Threat / Computer network security / Cyberwarfare / Computer security

    WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios Kevin Zhijie Chen Guofei Gu

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2012-12-11 01:17:01
    4

    Microsoft Word - Strider_HoneyMonkey_NDSS2006_2-column_Camera_Ready.doc

    Add to Reading List

    Source URL: www.isoc.org

    Language: English - Date: 2006-02-09 00:37:17
      5Computing / Client honeypot / Honeypot / Malware / Spyware / HoneyMonkey / Honeyd / Threat / Adware / Computer network security / Cyberwarfare / Computer security

      2nd Generation Honeyclients Robert Danford SANS Internet Storm Center Research funded in part with a grant from StillSecure (http://www.stillsecure.com) Author can be reached at:

      Add to Reading List

      Source URL: handlers.dshield.org

      Language: English - Date: 2009-09-30 11:18:14
      6Computing / Malware / Antivirus software / Client honeypot / Cross-site scripting / Computer virus / Botnet / Tencent QQ / HoneyMonkey / Cyberwarfare / Computer security / Computer network security

      Studying Malicious Websites and the Underground Economy on the Chinese Web Jianwei Zhuge1 , Thorsten Holz2 , Chengyu Song1 , Jinpeng Guo1 , Xinhui Han1 , and Wei Zou1 1

      Add to Reading List

      Source URL: weis2008.econinfosec.org

      Language: English - Date: 2008-05-14 10:00:30
      7Computer security / Antivirus software / Client honeypot / Malware / Rogue software / Gumblar / HoneyMonkey / JavaScript / World Wide Web / Computing / Computer network security / Cyberwarfare

      BadSignal-Reputation-bar.eps

      Add to Reading List

      Source URL: static.googleusercontent.com

      Language: English - Date: 2012-04-01 20:13:23
      8Computer security / Client honeypot / System software / Client-side / Honeypot / Client / HoneyMonkey / Exploit / X Window System / Computer network security / Software / Computing

      Analyse & Benchmarking

      Add to Reading List

      Source URL: www.terena.org

      Language: English - Date: 2008-09-27 07:10:54
      9Security / Honeypot / Network security / Computer insecurity / Vulnerability / Malware / Client honeypot / HoneyMonkey / Computer network security / Cyberwarfare / Computer security

      Project Partners The NoAH project involves eight partners from the academic, research and commercial sectors and represents a total investment of almost 2.5 million euro, 60% of which is funded by the Research Infrastruc

      Add to Reading List

      Source URL: www.fp6-noah.org

      Language: English - Date: 2007-05-14 06:31:40
      10Honeypot / Computing / Computer security / Client honeypot / Project Honey Pot / Anti-spam techniques / Honeytoken / Email address harvesting / HoneyMonkey / Computer network security / Spamming / Cyberwarfare

      Available ONLINE www.vsrdjournals.com VSRD-IJCSIT, Vol. 2 (2), 2012, [removed]

      Add to Reading List

      Source URL: www.vsrdjournals.com

      Language: English - Date: 2013-06-28 03:31:03
      UPDATE