Honeyd

Results: 21



#Item
11HONEYPOT SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region  The contents of this document remain the property of, and may not be

HONEYPOT SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:29:47
12CITI Technical Report[removed]A Virtual Honeypot Framework Niels Provos [removed]

CITI Technical Report[removed]A Virtual Honeypot Framework Niels Provos [removed]

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2003-10-21 17:21:37
13Preserving Obliviousness Characteristic of Honeypot database S. K. Gupta† Anand Gupta‡  Renu Damor†

Preserving Obliviousness Characteristic of Honeypot database S. K. Gupta† Anand Gupta‡ Renu Damor†

Add to Reading List

Source URL: www.cse.iitb.ac.in

Language: English - Date: 2006-11-22 09:13:57
14OCHD:Preserving Obliviousness Characteristic of Honeypot Database S. K. Gupta† Renu Damor†

OCHD:Preserving Obliviousness Characteristic of Honeypot Database S. K. Gupta† Renu Damor†

Add to Reading List

Source URL: www.cse.iitb.ac.in

Language: English - Date: 2006-11-22 09:13:57
15Computing / Client honeypot / Honeypot / Malware / Spyware / HoneyMonkey / Honeyd / Threat / Adware / Computer network security / Cyberwarfare / Computer security

2nd Generation Honeyclients Robert Danford SANS Internet Storm Center Research funded in part with a grant from StillSecure (http://www.stillsecure.com) Author can be reached at:

Add to Reading List

Source URL: handlers.dshield.org

Language: English - Date: 2009-09-30 11:18:14
16HONEYD[removed]OpenBSD System Manager’s Manual HONEYD ( 8 )

HONEYD[removed]OpenBSD System Manager’s Manual HONEYD ( 8 )

Add to Reading List

Source URL: niels.xtdnet.nl

Language: English - Date: 2003-11-27 01:52:57
17A Virtual Honeypot Framework Niels Provos∗ Google, Inc. [removed] Abstract A honeypot is a closely monitored network decoy

A Virtual Honeypot Framework Niels Provos∗ Google, Inc. [removed] Abstract A honeypot is a closely monitored network decoy

Add to Reading List

Source URL: niels.xtdnet.nl

Language: English - Date: 2004-08-12 13:04:57
18Research in Honeypot Technologies Karl Schuttler (E00921961) Eastern Michigan University College of Technology 1. Introduction The proposed research project serves to act as a practical, real-world lab on the use of exi

Research in Honeypot Technologies Karl Schuttler (E00921961) Eastern Michigan University College of Technology 1. Introduction The proposed research project serves to act as a practical, real-world lab on the use of exi

Add to Reading List

Source URL: www.emich.edu

Language: English - Date: 2012-02-23 14:57:36
19

PDF Document

Add to Reading List

Source URL: 2009.hack.lu

Language: English - Date: 2006-11-11 03:37:20
20SIXTH FRAMEWORK PROGRAMME  Structuring the European Research Area Specific Programme  RESEARCH INFRASTRUCTURES ACTION

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-11-03 10:42:29