Works matching DE "HONEYPOTS (Network security)"
1
- International Journal of Networked & Distributed Computing, 2024, v. 12, n. 2, p. 250, doi. 10.1007/s44227-024-00032-1
- Alharbi, Fares;
- Kashyap, Gautam Siddharth
- Article
2
- FUPRE Journal of Scientific & Industrial Research, 2023, v. 7, n. 3, p. 61
- EJEH, P.;
- ADISHI, E.;
- OKORO, E.;
- JISU, A.
- Article
3
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 1, p. 38, doi. 10.1049/iet-ifs.2015.0256
- Fan, Wenjun;
- Fernández, David;
- Du, Zhihui
- Article
4
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2016, v. 19, n. 2, p. 415, doi. 10.21279/1454-864X-16-I2-062
- EFTIMIE, Sergiu;
- RĂCUCIU, Ciprian
- Article
5
- ISSA Journal, 2017, v. 15, n. 8, p. 5
- Article
6
- ISSA Journal, 2016, v. 14, n. 11, p. 6
- Article
7
- Journal of Telecommunications & Information Technology, 2016, n. 2, p. 60, doi. 10.26636/jtit.2016.2.720
- Studiawan, Hudan;
- Djanali, Supeno;
- Pratomo, Baskoro Adi
- Article
8
- Journal of Counterterrorism & Homeland Security International, 2018, v. 24, n. 1, p. 10
- Article
9
- Multi-Knowledge Electronic Comprehensive Journal For Education & Science Publications (MECSJ), 2020, n. 34, p. 1
- Al-thakafi, Reham;
- Yahya, S.;
- Jamal, Amani T.
- Article
10
- Behavioral Ecology & Sociobiology, 2018, v. 72, n. 10, p. 1, doi. 10.1007/s00265-018-2577-4
- Kelemen, Evan;
- Dornhaus, Anna
- Article
11
- Decision Analysis, 2018, v. 15, n. 2, p. 90, doi. 10.1287/deca.2017.0363
- Mai, Bin;
- Kulkarni, Shailesh
- Article
12
- International Journal of System & Software Engineering, 2015, v. 3, n. 2, p. 10, doi. 10.21863/ijsse/2015.3.2.006
- Kapse, Dinesh S.;
- Bagdi, Vijay
- Article
13
- Informatics, 2025, v. 12, n. 1, p. 14, doi. 10.3390/informatics12010014
- Morić, Zlatan;
- Dakić, Vedran;
- Regvart, Damir
- Article
14
- Reading & Writing (20798245), 2021, v. 12, n. 1, p. 18
- Article
15
- EURASIP Journal on Information Security, 2017, v. 2017, n. 1, p. 1, doi. 10.1186/s13635-017-0057-4
- Sokol, Pavol;
- Míšek, Jakub;
- Husák, Martin
- Article
16
- International Journal of Electronics & Telecommunications, 2024, v. 70, n. 4, p. 1099, doi. 10.24425/ijet.2024.152512
- Cabaj, Krzytof;
- Wysota, Witold;
- Grochowski, Konrad;
- Gawkowski, Piotr
- Article
17
- Military Engineer / Hadmérnök, 2012, v. 7, n. 2, p. 312
- Article
18
- Military Engineer / Hadmérnök, 2011, v. 6, n. 4, p. 239
- Article
19
- Information Security Journal: A Global Perspective, 2013, v. 22, n. 4, p. 159, doi. 10.1080/19393555.2013.828802
- Hayatle, Osama;
- Otrok, Hadi;
- Youssef, Amr
- Article
20
- eLearning & Software for Education, 2017, v. 3, p. 352, doi. 10.12753/2066-026X-17-226
- BARBU, Ionuț-Daniel;
- PETRICĂ, Gabriel;
- AXINTE, Sabina-Daniela;
- BACIVAROV, Ioan
- Article
21
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 6, p. 7056, doi. 10.11591/ijece.v13i6.pp7056-7064
- Abualhija, Mwaffaq;
- Al-Shaf’i, Nid’a;
- Turab, Nidal M.;
- Hussein, Abdelrahman
- Article
22
- International Journal of Electrical & Computer Engineering (2088-8708), 2014, v. 4, n. 6, p. 948, doi. 10.11591/ijece.v4i6.6885
- Aguirre-Anaya, Eleazar;
- Gallegos-Garcia, Gina;
- Solano Luna, Nicolás;
- Villa Vargas, Luis Alfonso
- Article
23
- International Journal of Network Management, 2016, v. 26, n. 3, p. 156, doi. 10.1002/nem.1923
- Jiang, Ci‐Bin;
- Liu, I‐Hsien;
- Chung, Yao‐Nien;
- Li, Jung‐Shian
- Article
24
- Security & Communication Networks, 2014, v. 7, n. 2, p. 338, doi. 10.1002/sec.737
- Ghourabi, Abdallah;
- Abbes, Tarek;
- Bouhoula, Adel
- Article
25
- Security & Communication Networks, 2014, v. 7, n. 2, p. 322, doi. 10.1002/sec.897
- Obaidat, Mohammad S.;
- Nicopolitidis, Petros;
- Han, Weili
- Article
26
- Security & Communication Networks, 2013, v. 6, n. 7, p. 844, doi. 10.1002/sec.619
- Chen, Chia-Mei;
- Cheng, Sheng-Tzong;
- Zeng, Ruei-Yu
- Article
27
- Security & Communication Networks, 2012, v. 5, n. 10, p. 1094, doi. 10.1002/sec.431
- Moon, Young Hoon;
- Kim, Eunjin;
- Hur, Suh Mahn;
- Kim, Huy Kang
- Article
28
- International Journal of Safety & Security Engineering, 2022, v. 12, n. 6, p. 737, doi. 10.18280/ijsse.120610
- Mudgal, Akshay;
- Bhatia, Shaveta
- Article
29
- Folklore Forum, 2013, p. 260
- Nassar, Nader;
- Miller, Grant
- Article
30
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 9, p. 4512, doi. 10.3837/tiis.2018.09.021
- Erdem, Ömer;
- Pektaş, Abdurrahman;
- Kara, Mehmet
- Article
31
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 1, p. 484, doi. 10.3837/tiis.2017.01.026
- Yixun Hu;
- Kangfeng Zheng;
- Xu Wang;
- Yixian Yang
- Article
32
- Multimedia Tools & Applications, 2015, v. 74, n. 20, p. 8791, doi. 10.1007/s11042-013-1487-8
- Article
33
- Mapana Journal of Sciences, 2022, v. 21, n. 4, p. 1, doi. 10.12723/mjs.63.6
- Pahal, Sudesh;
- Priya, Preity
- Article
34
- Mathematics (2227-7390), 2024, v. 12, n. 10, p. 1508, doi. 10.3390/math12101508
- Wang, Le;
- Deng, Jianyu;
- Tan, Haonan;
- Xu, Yinghui;
- Zhu, Junyi;
- Zhang, Zhiqiang;
- Li, Zhaohua;
- Zhan, Rufeng;
- Gu, Zhaoquan
- Article
35
- Wireless Personal Communications, 2018, v. 103, n. 2, p. 1179, doi. 10.1007/s11277-018-5307-3
- Gandhi, Usha Devi;
- Kumar, Priyan Malarvizhi;
- Kadu, Shreyas;
- Varatharajan, R.;
- Manogaran, Gunasekaran;
- Sundarasekar, Revathi
- Article
36
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 1965, doi. 10.1007/s11277-016-3298-5
- Rajarajan, G.;
- Ganesan, Lakshmanan
- Article
37
- Wireless Personal Communications, 2016, v. 90, n. 2, p. 831, doi. 10.1007/s11277-016-3229-5
- Article
38
- Wireless Personal Communications, 2014, v. 78, n. 2, p. 995, doi. 10.1007/s11277-014-1797-9
- Tapaswi, Shashikala;
- Mahboob, Adnan;
- Shukla, Ajay;
- Gupta, Ishan;
- Verma, Pranshu;
- Dhar, Joydip
- Article
39
- Internet of Things (IoT), 2024, v. 5, n. 4, p. 730, doi. 10.3390/iot5040033
- Omar, Amira Hossam Eldin;
- Soubra, Hassan;
- Moulla, Donatien Koulla;
- Abran, Alain
- Article
40
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 8, p. 929, doi. 10.1049/iet-com.2015.0497
- Selvaraj, Rajalakshmi;
- Kuthadi, Venu Madhav;
- Marwala, Tshilidzi
- Article
41
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 4, p. 30, doi. 10.26483/ijarcs.v9i4.6176
- Article
42
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 756
- Kumar, Praveen;
- Verma, Ram Singar
- Article
43
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 1108
- Kumar, Praveen;
- Verma, Ram Singar
- Article
44
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 6, p. 290
- Bhatti, Dharmendra G.;
- Bhakta, Sonal;
- Shah, Ankita
- Article
45
- Journal of Electrical & Computer Engineering, 2016, p. 1, doi. 10.1155/2016/5212314
- Basam, Dileep;
- Ransbottom, J. Scot;
- Marchany, Randy;
- Tront, Joseph G.
- Article
47
- Journal of Cyber Security Technology, 2018, v. 2, n. 2, p. 75, doi. 10.1080/23742917.2018.1495375
- Dowling, Seamus;
- Schukat, Michael;
- Barrett, Enda
- Article
48
- Criminology & Public Policy, 2017, v. 16, n. 3, p. 689, doi. 10.1111/1745-9133.12312
- Testa, Alexander;
- Maimon, David;
- Sobesto, Bertrand;
- Cukier, Michel
- Article
49
- Criminology & Public Policy, 2017, v. 16, n. 3, p. 727, doi. 10.1111/1745-9133.12314
- Article
50
- Criminology & Public Policy, 2017, v. 16, n. 3, p. 739, doi. 10.1111/1745-9133.12315
- Article