Works matching DE "HONEYPOTS (Network security)"
1
- Applied Sciences (2076-3417), 2025, v. 15, n. 10, p. 5251, doi. 10.3390/app15105251
- Lanz, Stefanie;
- Pignol, Sarah Lily-Rose;
- Schmitt, Patrick;
- Wang, Haochen;
- Papaioannou, Maria;
- Choudhary, Gaurav;
- Dragoni, Nicola
- Article
2
- Decision Analysis, 2018, v. 15, n. 2, p. 90, doi. 10.1287/deca.2017.0363
- Mai, Bin;
- Kulkarni, Shailesh
- Article
3
- International Journal of System & Software Engineering, 2015, v. 3, n. 2, p. 10, doi. 10.21863/ijsse/2015.3.2.006
- Kapse, Dinesh S.;
- Bagdi, Vijay
- Article
4
- International Journal of Network Management, 2016, v. 26, n. 3, p. 156, doi. 10.1002/nem.1923
- Jiang, Ci‐Bin;
- Liu, I‐Hsien;
- Chung, Yao‐Nien;
- Li, Jung‐Shian
- Article
5
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 4, p. 30, doi. 10.26483/ijarcs.v9i4.6176
- Article
6
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 756
- Kumar, Praveen;
- Verma, Ram Singar
- Article
7
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 1108
- Kumar, Praveen;
- Verma, Ram Singar
- Article
8
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 6, p. 290
- Bhatti, Dharmendra G.;
- Bhakta, Sonal;
- Shah, Ankita
- Article
9
- Journal of Electrical & Computer Engineering, 2016, p. 1, doi. 10.1155/2016/5212314
- Basam, Dileep;
- Ransbottom, J. Scot;
- Marchany, Randy;
- Tront, Joseph G.
- Article
10
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 1, p. 38, doi. 10.1049/iet-ifs.2015.0256
- Fan, Wenjun;
- Fernández, David;
- Du, Zhihui
- Article
11
- Multi-Knowledge Electronic Comprehensive Journal For Education & Science Publications (MECSJ), 2020, n. 34, p. 1
- Al-thakafi, Reham;
- Yahya, S.;
- Jamal, Amani T.
- Article
12
- Informatics, 2025, v. 12, n. 1, p. 14, doi. 10.3390/informatics12010014
- Morić, Zlatan;
- Dakić, Vedran;
- Regvart, Damir
- Article
13
- Folklore Forum, 2013, p. 260
- Nassar, Nader;
- Miller, Grant
- Article
14
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2018, v. 70, n. 1, p. 67
- Vasile, Georgiana;
- Cangea, Otilia
- Article
15
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2018, v. 70, n. 1, p. 45
- Article
16
- IAENG International Journal of Computer Science, 2025, v. 52, n. 1, p. 90
- Jiali Xue;
- Jianguo Ren;
- Liping Feng;
- Lei Wang
- Article
17
- Mapana Journal of Sciences, 2022, v. 21, n. 4, p. 1, doi. 10.12723/mjs.63.6
- Pahal, Sudesh;
- Priya, Preity
- Article
18
- Behavioral Ecology & Sociobiology, 2018, v. 72, n. 10, p. 1, doi. 10.1007/s00265-018-2577-4
- Kelemen, Evan;
- Dornhaus, Anna
- Article
19
- Mathematics (2227-7390), 2024, v. 12, n. 10, p. 1508, doi. 10.3390/math12101508
- Wang, Le;
- Deng, Jianyu;
- Tan, Haonan;
- Xu, Yinghui;
- Zhu, Junyi;
- Zhang, Zhiqiang;
- Li, Zhaohua;
- Zhan, Rufeng;
- Gu, Zhaoquan
- Article
20
- Multimedia Tools & Applications, 2015, v. 74, n. 20, p. 8791, doi. 10.1007/s11042-013-1487-8
- Article
21
- Wireless Personal Communications, 2018, v. 103, n. 2, p. 1179, doi. 10.1007/s11277-018-5307-3
- Gandhi, Usha Devi;
- Kumar, Priyan Malarvizhi;
- Kadu, Shreyas;
- Varatharajan, R.;
- Manogaran, Gunasekaran;
- Sundarasekar, Revathi
- Article
22
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 1965, doi. 10.1007/s11277-016-3298-5
- Rajarajan, G.;
- Ganesan, Lakshmanan
- Article
23
- Wireless Personal Communications, 2016, v. 90, n. 2, p. 831, doi. 10.1007/s11277-016-3229-5
- Article
24
- Wireless Personal Communications, 2014, v. 78, n. 2, p. 995, doi. 10.1007/s11277-014-1797-9
- Tapaswi, Shashikala;
- Mahboob, Adnan;
- Shukla, Ajay;
- Gupta, Ishan;
- Verma, Pranshu;
- Dhar, Joydip
- Article
25
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 8, p. 929, doi. 10.1049/iet-com.2015.0497
- Selvaraj, Rajalakshmi;
- Kuthadi, Venu Madhav;
- Marwala, Tshilidzi
- Article
26
- ISSA Journal, 2017, v. 15, n. 8, p. 5
- Article
27
- ISSA Journal, 2016, v. 14, n. 11, p. 6
- Article
28
- Issues in Information Systems, 2024, v. 25, n. 1, p. 265, doi. 10.48009/1_iis_2024_122
- Holbel, Reilly;
- Yerby, Johnathan;
- Smith, Warner
- Article
29
- Reading & Writing (20798245), 2021, v. 12, n. 1, p. 18
- Article
30
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 6, p. 7056, doi. 10.11591/ijece.v13i6.pp7056-7064
- Abualhija, Mwaffaq;
- Al-Shaf’i, Nid’a;
- Turab, Nidal M.;
- Hussein, Abdelrahman
- Article
31
- International Journal of Electrical & Computer Engineering (2088-8708), 2014, v. 4, n. 6, p. 948, doi. 10.11591/ijece.v4i6.6885
- Aguirre-Anaya, Eleazar;
- Gallegos-Garcia, Gina;
- Solano Luna, Nicolás;
- Villa Vargas, Luis Alfonso
- Article
32
- Computing & Informatics, 2017, v. 36, n. 1, p. 113, doi. 10.4149/cai_2017_1_113
- CHOVANCOVÁ, Eva;
- ÁDÁM, Norbert;
- BALÁŽ, Anton;
- PIETROKOVÁ, Emília;
- FECIĽAK, Peter;
- ŠIMOŇÁK, Slavomír;
- CHOVANEC, Martin
- Article
33
- Journal of Information Science & Engineering, 2012, v. 28, n. 5, p. 911
- Hong-Geun Kim;
- Dongjin Kim;
- Seong-Je Cho;
- Moonju Park;
- Minkyu Park
- Article
34
- Internet of Things (IoT), 2024, v. 5, n. 4, p. 730, doi. 10.3390/iot5040033
- Omar, Amira Hossam Eldin;
- Soubra, Hassan;
- Moulla, Donatien Koulla;
- Abran, Alain
- Article
35
- Future Internet, 2024, v. 16, n. 12, p. 455, doi. 10.3390/fi16120455
- Papazis, Kon;
- Chilamkurti, Naveen
- Article
36
- Future Internet, 2022, v. 14, n. 12, p. 362, doi. 10.3390/fi14120362
- Florea, Răzvan;
- Craus, Mitică
- Article
37
- EURASIP Journal on Information Security, 2017, v. 2017, n. 1, p. 1, doi. 10.1186/s13635-017-0057-4
- Sokol, Pavol;
- Míšek, Jakub;
- Husák, Martin
- Article
38
- International Journal of Electronics & Telecommunications, 2024, v. 70, n. 4, p. 1099, doi. 10.24425/ijet.2024.152512
- Cabaj, Krzytof;
- Wysota, Witold;
- Grochowski, Konrad;
- Gawkowski, Piotr
- Article
39
- Ovidius University Annals, Series Economic Sciences, 2015, v. 15, n. 1, p. 595
- Petac, Eugen;
- Duma, Petruţ
- Article
40
- Military Engineer / Hadmérnök, 2012, v. 7, n. 2, p. 312
- Article
41
- Military Engineer / Hadmérnök, 2011, v. 6, n. 4, p. 239
- Article
42
- International Journal of Safety & Security Engineering, 2022, v. 12, n. 6, p. 737, doi. 10.18280/ijsse.120610
- Mudgal, Akshay;
- Bhatia, Shaveta
- Article
43
- Journal of Telecommunications & Information Technology, 2016, n. 2, p. 60, doi. 10.26636/jtit.2016.2.720
- Studiawan, Hudan;
- Djanali, Supeno;
- Pratomo, Baskoro Adi
- Article
44
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2016, v. 19, n. 2, p. 415, doi. 10.21279/1454-864X-16-I2-062
- EFTIMIE, Sergiu;
- RĂCUCIU, Ciprian
- Article
45
- eLearning & Software for Education, 2017, v. 3, p. 352, doi. 10.12753/2066-026X-17-226
- BARBU, Ionuț-Daniel;
- PETRICĂ, Gabriel;
- AXINTE, Sabina-Daniela;
- BACIVAROV, Ioan
- Article
46
- Security & Communication Networks, 2014, v. 7, n. 2, p. 322, doi. 10.1002/sec.897
- Obaidat, Mohammad S.;
- Nicopolitidis, Petros;
- Han, Weili
- Article
47
- Security & Communication Networks, 2014, v. 7, n. 2, p. 338, doi. 10.1002/sec.737
- Ghourabi, Abdallah;
- Abbes, Tarek;
- Bouhoula, Adel
- Article
48
- Security & Communication Networks, 2013, v. 6, n. 7, p. 844, doi. 10.1002/sec.619
- Chen, Chia-Mei;
- Cheng, Sheng-Tzong;
- Zeng, Ruei-Yu
- Article
49
- Security & Communication Networks, 2012, v. 5, n. 10, p. 1094, doi. 10.1002/sec.431
- Moon, Young Hoon;
- Kim, Eunjin;
- Hur, Suh Mahn;
- Kim, Huy Kang
- Article
50
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 9, p. 4512, doi. 10.3837/tiis.2018.09.021
- Erdem, Ömer;
- Pektaş, Abdurrahman;
- Kara, Mehmet
- Article