Honeypot

Results: 237



#Item
31The Honeynet Project  Honeynets are a sophisticated type of honeypot used to gather information on the enemy. The Honeynet Project has made extensive advances in Honeynet technologies, what we call GenII systems. These t

The Honeynet Project Honeynets are a sophisticated type of honeypot used to gather information on the enemy. The Honeynet Project has made extensive advances in Honeynet technologies, what we call GenII systems. These t

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
32Security Analysis of the Estonian Internet Voting System J. Alex Halderman1 Harri Hursti Jason Kitcat2 Margaret MacAlpine Travis Finkenauer1 Drew Springall1 1 University  of Michigan, Ann Arbor, MI, U.S.A.

Security Analysis of the Estonian Internet Voting System J. Alex Halderman1 Harri Hursti Jason Kitcat2 Margaret MacAlpine Travis Finkenauer1 Drew Springall1 1 University of Michigan, Ann Arbor, MI, U.S.A.

Add to Reading List

Source URL: www.verifiedvoting.org

Language: English - Date: 2014-10-07 12:28:22
33SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE  A European Network of Excellence in Managing Threats and

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE A European Network of Excellence in Managing Threats and

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-14 13:46:14
34HITBSecConf2007 - Dubai CONFERENCE KIT 2.0 * 20 Network Security Specialists and Researchers * 4-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods * Fundamental Defense Methodo

HITBSecConf2007 - Dubai CONFERENCE KIT 2.0 * 20 Network Security Specialists and Researchers * 4-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods * Fundamental Defense Methodo

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:52:21
35Information at all.nethttp://all.net/

Information at all.nethttp://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:08:07
36WOMBAT:	
  a	
  Worldwide	
  Observatory	
  	
   of	
  Malicious	
  Behaviors	
  and	
  A;ack	
  Threats	
   Corrado	
  Leita	
   Symantec	
  Research	
  Labs	
   WOMBAT	
  

WOMBAT:  a  Worldwide  Observatory     of  Malicious  Behaviors  and  A;ack  Threats   Corrado  Leita   Symantec  Research  Labs   WOMBAT  

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:51
37Computer Security and Machine Learning: Worst Enemies or Best Friends? Konrad Rieck Technische Universität Berlin SYSSEC Workshop 2011

Computer Security and Machine Learning: Worst Enemies or Best Friends? Konrad Rieck Technische Universität Berlin SYSSEC Workshop 2011

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:31:19
38Information at all.nethttp://all.net/

Information at all.nethttp://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:09:06
39Embedded Malware Ruhr-University Bochum Systems Security Research at Thorsten Holz

Embedded Malware Ruhr-University Bochum Systems Security Research at Thorsten Holz

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:36:05
40Rozzle: De-Cloaking Internet Malware Clemens Kolbitsch Benjamin Livshits and Benjamin Zorn  Christian Seifert

Rozzle: De-Cloaking Internet Malware Clemens Kolbitsch Benjamin Livshits and Benjamin Zorn Christian Seifert

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-03-06 19:36:00