Honeypot

Results: 237



#Item
11Design, Implementation, and Operation of a Mobile Honeypot Matthias Wählisch Freie Universität Berlin André Vorbach Deutsche Telekom AG

Design, Implementation, and Operation of a Mobile Honeypot Matthias Wählisch Freie Universität Berlin André Vorbach Deutsche Telekom AG

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2013-01-30 22:31:02
    12Collective Spammer Detection in Evolving Multi-Relational Social Networks Shobeir Fakhraei ∗ University of Maryland College Park, MD, USA

    Collective Spammer Detection in Evolving Multi-Relational Social Networks Shobeir Fakhraei ∗ University of Maryland College Park, MD, USA

    Add to Reading List

    Source URL: www.cs.umd.edu

    Language: English - Date: 2015-06-26 16:14:02
    13Monitoring Technologies for Mitigating Insider Threats Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo, Department of Computer Science Columbia University August 21,

    Monitoring Technologies for Mitigating Insider Threats Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo, Department of Computer Science Columbia University August 21,

    Add to Reading List

    Source URL: ids.cs.columbia.edu

    Language: English - Date: 2011-09-04 10:44:36
    14Bait and Snitch: Defending Computer Systems with Decoys Jonathan Voris, Jill Jermyn, Angelos D. Keromytis, and Salvatore J. Stolfo Department of Computer Science Columbia University, New York, NY 10027 {jvoris@cs., jj260

    Bait and Snitch: Defending Computer Systems with Decoys Jonathan Voris, Jill Jermyn, Angelos D. Keromytis, and Salvatore J. Stolfo Department of Computer Science Columbia University, New York, NY 10027 {jvoris@cs., jj260

    Add to Reading List

    Source URL: ids.cs.columbia.edu

    Language: English - Date: 2012-12-05 15:53:47
    15Honey, I caught a worm Building yourself a honeypot, some practical issues Arthur Donkers  The latest version of this paper is available via http://www.reseau.nl/ Introduction

    Honey, I caught a worm Building yourself a honeypot, some practical issues Arthur Donkers The latest version of this paper is available via http://www.reseau.nl/ Introduction

    Add to Reading List

    Source URL: www.sane.nl

    Language: English - Date: 2002-06-10 11:08:43
      16AHA - Adaptive Honeypot Alternative G´erard Wagener October 29,

      AHA - Adaptive Honeypot Alternative G´erard Wagener October 29,

      Add to Reading List

      Source URL: archive.hack.lu

      Language: English - Date: 2010-10-29 15:14:16
        17Baiting Inside Attackers Using Decoy Documents Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo Department of Computer Science Columbia University  Abstract. The insider threat remains one of th

        Baiting Inside Attackers Using Decoy Documents Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo Department of Computer Science Columbia University Abstract. The insider threat remains one of th

        Add to Reading List

        Source URL: ids.cs.columbia.edu

        Language: English - Date: 2011-09-04 10:44:35
        18honeynet_letter_julia_v3.indd

        honeynet_letter_julia_v3.indd

        Add to Reading List

        Source URL: warsaw2014.honeynet.org

        Language: English - Date: 2014-01-16 05:46:04
        19Microsoft Word - Loredana interview

        Microsoft Word - Loredana interview

        Add to Reading List

        Source URL: www.honeypot.org.uk

        Language: English
          20Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures SCADA Honeypot  Innovative system developed and by :

          Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures SCADA Honeypot Innovative system developed and by :

          Add to Reading List

          Source URL: www.cockpitci.eu

          Language: English - Date: 2015-02-10 15:15:17