Works matching Honeypots (Network security)
Results: 67
A Game-Theoretic Approach for Network Security Using Honeypots.
- Published in:
- Future Internet, 2022, v. 14, n. 12, p. 362, doi. 10.3390/fi14120362
- By:
- Publication type:
- Article
An Intrusion Detection System for Network Security based on an Advanced Honeypots Server.
- Published in:
- International Journal of Simulation: Systems, Science & Technology, 2018, v. 19, n. 4, p. 2.1, doi. 10.5013/IJSSST.a.19.04.02
- By:
- Publication type:
- Article
Spark-Based Network Security Honeypot System: Detailed Performance Analysis.
- Published in:
- International Journal of Safety & Security Engineering, 2022, v. 12, n. 6, p. 737, doi. 10.18280/ijsse.120610
- By:
- Publication type:
- Article
Blocking and Tackling as "Disruptive" Technologies.
- Published in:
- ISSA Journal, 2017, v. 15, n. 8, p. 5
- By:
- Publication type:
- Article
Study of Honeypot Technology for Virtual Space Monitoring - Conpot Operation.
- Published in:
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2018, v. 70, n. 1, p. 67
- By:
- Publication type:
- Article
Utilizing virtualized honeypots for threat hunting, malware analysis, and reporting.
- Published in:
- Issues in Information Systems, 2024, v. 25, n. 1, p. 265, doi. 10.48009/1_iis_2024_122
- By:
- Publication type:
- Article
An Analysis of Worm Dynamics with Honeypot Feedback in Scale-Free Networks.
- Published in:
- IAENG International Journal of Computer Science, 2025, v. 52, n. 1, p. 90
- By:
- Publication type:
- Article
Steal Me.
- Published in:
- ISSA Journal, 2016, v. 14, n. 11, p. 6
- By:
- Publication type:
- Article
AARF: Autonomous Attack Response Framework for Honeypots to Enhance Interaction Based on Multi-Agent Dynamic Game.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 10, p. 1508, doi. 10.3390/math12101508
- By:
- Publication type:
- Article
Hydrakon, a Framework for Measuring Indicators of Deception in Emulated Monitoring Systems.
- Published in:
- Future Internet, 2024, v. 16, n. 12, p. 455, doi. 10.3390/fi16120455
- By:
- Publication type:
- Article
Method for a Two Dimensional Honeypot to Deter Web Bots in Commerce Systems.
- Published in:
- Folklore Forum, 2013, p. 260
- By:
- Publication type:
- Article
A Comprehensive Research Study on Low-Interaction Secure Shell Honeypot.
- Published in:
- Mapana Journal of Sciences, 2022, v. 21, n. 4, p. 1, doi. 10.12723/mjs.63.6
- By:
- Publication type:
- Article
Ant-based distributed denial of service detection technique using roaming virtual honeypots.
- Published in:
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 8, p. 929, doi. 10.1049/iet-com.2015.0497
- By:
- Publication type:
- Article
Study of Honeypot Technology for Virtual Space Monitoring - Parsing the conpot.log file.
- Published in:
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2018, v. 70, n. 1, p. 45
- By:
- Publication type:
- Article
Deception Technology: AN IACSP Q&A With Eric Schlesinger, The Chief Information Security Officer At Polaris Alpha.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2018, v. 24, n. 1, p. 10
- Publication type:
- Article
Performance Evaluation of Cyber Criminal Detection Techniques.
- Published in:
- International Journal of Simulation: Systems, Science & Technology, 2018, v. 19, n. 4, p. 4.1, doi. 10.5013/IJSSST.a.19.04.04
- By:
- Publication type:
- Article
A Study on Cyber Defence Honeynet Technology and Configuration Examples.
- Published in:
- International Journal of Simulation: Systems, Science & Technology, 2016, v. 17, n. 47, p. 26.1, doi. 10.5013/IJSSST.a.17.47.26
- By:
- Publication type:
- Article
An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices.
- Published in:
- Internet of Things (IoT), 2024, v. 5, n. 4, p. 730, doi. 10.3390/iot5040033
- By:
- Publication type:
- Article
Some Aspects of Intrusion Detection in IoE.
- Published in:
- Ovidius University Annals, Series Economic Sciences, 2015, v. 15, n. 1, p. 595
- By:
- Publication type:
- Article
Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots.
- Published in:
- Journal of Information Science & Engineering, 2012, v. 28, n. 5, p. 911
- By:
- Publication type:
- Article
Efficient Security Services of Honeypot using Kerberos for Detecting Intruders.
- Published in:
- International Journal of System & Software Engineering, 2015, v. 3, n. 2, p. 10, doi. 10.21863/ijsse/2015.3.2.006
- By:
- Publication type:
- Article
Encountering social engineering activities with a novel honeypot mechanism.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 6, p. 7056, doi. 10.11591/ijece.v13i6.pp7056-7064
- By:
- Publication type:
- Article
A New Procedure to Detect Low Interaction Honeypots.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2014, v. 4, n. 6, p. 948, doi. 10.11591/ijece.v4i6.6885
- By:
- Publication type:
- Article
ANALYZING CYBER THREAT ACTORS OF E-LEARNING PLATFORMS BY THE USE OF A CLOUD BASED HONEYNET.
- Published in:
- eLearning & Software for Education, 2017, v. 3, p. 352, doi. 10.12753/2066-026X-17-226
- By:
- Publication type:
- Article
Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities.
- Published in:
- Journal of Electrical & Computer Engineering, 2016, p. 1, doi. 10.1155/2016/5212314
- By:
- Publication type:
- Article
HIoTPOT: Surveillance on IoT Devices against Recent Threats.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 2, p. 1179, doi. 10.1007/s11277-018-5307-3
- By:
- Publication type:
- Article
Empowering Network Security through Advanced Analysis of Malware Samples: Leveraging System Metrics and Network Log Data for Informed Decision-Making.
- Published in:
- International Journal of Networked & Distributed Computing, 2024, v. 12, n. 2, p. 250, doi. 10.1007/s44227-024-00032-1
- By:
- Publication type:
- Article
Hybrid Integration of Organizational Honeypot to Aid Data Integrity, Protection of Organizational Resources and Dissuade insider Threats.
- Published in:
- FUPRE Journal of Scientific & Industrial Research, 2023, v. 7, n. 3, p. 61
- By:
- Publication type:
- Article
HoneyThing: A New Honeypot Design for CPE Devices.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 9, p. 4512, doi. 10.3837/tiis.2018.09.021
- By:
- Publication type:
- Article
WORM-HUNTER: A Worm Guard System using Software-defined Networking.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 1, p. 484, doi. 10.3837/tiis.2017.01.026
- By:
- Publication type:
- Article
SECURING DISTRIBUTED COMPUTER SYSTEMS USING AN ADVANCED SOPHISTICATED HYBRID HONEYPOT TECHNOLOGY.
- Published in:
- Computing & Informatics, 2017, v. 36, n. 1, p. 113, doi. 10.4149/cai_2017_1_113
- By:
- Publication type:
- Article
When Hackers Err: The Impacts of False Positives on Information Security Games.
- Published in:
- Decision Analysis, 2018, v. 15, n. 2, p. 90, doi. 10.1287/deca.2017.0363
- By:
- Publication type:
- Article
A study on attack information collection using virtualization technology.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 20, p. 8791, doi. 10.1007/s11042-013-1487-8
- By:
- Publication type:
- Article
Illegal Roaming and File Manipulation on Target Computers.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 3, p. 689, doi. 10.1111/1745-9133.12312
- By:
- Publication type:
- Article
Ruminations on Warning Banners, Deterrence, and System Intrusion Research.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 3, p. 727, doi. 10.1111/1745-9133.12314
- By:
- Publication type:
- Article
On the Value of Honeypots to Produce Policy Recommendations.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 3, p. 739, doi. 10.1111/1745-9133.12315
- By:
- Publication type:
- Article
Security of e-systems.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 322, doi. 10.1002/sec.897
- By:
- Publication type:
- Article
Characterization of attacks collected from the deployment of Web service honeypot.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 338, doi. 10.1002/sec.737
- By:
- Publication type:
- Article
A proactive approach to intrusion detection and malware collection.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 7, p. 844, doi. 10.1002/sec.619
- By:
- Publication type:
- Article
Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 10, p. 1094, doi. 10.1002/sec.431
- By:
- Publication type:
- Article
INTRUSION DETECTION& PREVENTION USING HONEYPOT.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 4, p. 30, doi. 10.26483/ijarcs.v9i4.6176
- By:
- Publication type:
- Article
A Proposed Method to Enhance the Strength of Honeypot Through the use of IP-Spoofing Detection Method.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 756
- By:
- Publication type:
- Article
A Review on Recent Advances & Future Trends of Security in Honeypot.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 1108
- By:
- Publication type:
- Article
An Approach to Conceal Honeypot from Attacker.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 6, p. 290
- By:
- Publication type:
- Article
Graph-based Forensic Analysis of Web Honeypot.
- Published in:
- Journal of Telecommunications & Information Technology, 2016, n. 2, p. 60, doi. 10.26636/jtit.2016.2.720
- By:
- Publication type:
- Article
Statement of withdrawal.
- Published in:
- 2018
- Publication type:
- Correction Notice
Improving adaptive honeypot functionality with efficient reinforcement learning parameters for automated malware.
- Published in:
- Journal of Cyber Security Technology, 2018, v. 2, n. 2, p. 75, doi. 10.1080/23742917.2018.1495375
- By:
- Publication type:
- Article
HONEYPOT SYSTEM BASED ON SOFTWARE CONTAINERS.
- Published in:
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2016, v. 19, n. 2, p. 415, doi. 10.21279/1454-864X-16-I2-062
- By:
- Publication type:
- Article
Analysis of IoT devices' Vulnerability Attack Using a Honeypot.
- Published in:
- Multi-Knowledge Electronic Comprehensive Journal For Education & Science Publications (MECSJ), 2020, n. 34, p. 1
- By:
- Publication type:
- Article
Novel intrusion prediction mechanism based on honeypot log similarity.
- Published in:
- International Journal of Network Management, 2016, v. 26, n. 3, p. 156, doi. 10.1002/nem.1923
- By:
- Publication type:
- Article