Works matching DE "HONEYPOTS (Network security)"


Results: 63
    1
    2
    3
    4

    HONEYPOT SYSTEM BASED ON SOFTWARE CONTAINERS.

    Published in:
    Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2016, v. 19, n. 2, p. 415, doi. 10.21279/1454-864X-16-I2-062
    By:
    • EFTIMIE, Sergiu;
    • RĂCUCIU, Ciprian
    Publication type:
    Article
    5
    6

    Steal Me.

    Published in:
    ISSA Journal, 2016, v. 14, n. 11, p. 6
    By:
    • Williams, Branden R.
    Publication type:
    Article
    7

    Graph-based Forensic Analysis of Web Honeypot.

    Published in:
    Journal of Telecommunications & Information Technology, 2016, n. 2, p. 60, doi. 10.26636/jtit.2016.2.720
    By:
    • Studiawan, Hudan;
    • Djanali, Supeno;
    • Pratomo, Baskoro Adi
    Publication type:
    Article
    8
    9
    10
    11
    12
    13
    14
    15

    Honeypots and honeynets: issues of privacy.

    Published in:
    EURASIP Journal on Information Security, 2017, v. 2017, n. 1, p. 1, doi. 10.1186/s13635-017-0057-4
    By:
    • Sokol, Pavol;
    • Míšek, Jakub;
    • Husák, Martin
    Publication type:
    Article
    16
    17
    18
    19
    20
    21
    22

    A New Procedure to Detect Low Interaction Honeypots.

    Published in:
    International Journal of Electrical & Computer Engineering (2088-8708), 2014, v. 4, n. 6, p. 948, doi. 10.11591/ijece.v4i6.6885
    By:
    • Aguirre-Anaya, Eleazar;
    • Gallegos-Garcia, Gina;
    • Solano Luna, Nicolás;
    • Villa Vargas, Luis Alfonso
    Publication type:
    Article
    23
    24
    25

    Security of e-systems.

    Published in:
    Security & Communication Networks, 2014, v. 7, n. 2, p. 322, doi. 10.1002/sec.897
    By:
    • Obaidat, Mohammad S.;
    • Nicopolitidis, Petros;
    • Han, Weili
    Publication type:
    Article
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35

    HIoTPOT: Surveillance on IoT Devices against Recent Threats.

    Published in:
    Wireless Personal Communications, 2018, v. 103, n. 2, p. 1179, doi. 10.1007/s11277-018-5307-3
    By:
    • Gandhi, Usha Devi;
    • Kumar, Priyan Malarvizhi;
    • Kadu, Shreyas;
    • Varatharajan, R.;
    • Manogaran, Gunasekaran;
    • Sundarasekar, Revathi
    Publication type:
    Article
    36
    37
    38

    Markov Chain Based Roaming Schemes for Honeypots.

    Published in:
    Wireless Personal Communications, 2014, v. 78, n. 2, p. 995, doi. 10.1007/s11277-014-1797-9
    By:
    • Tapaswi, Shashikala;
    • Mahboob, Adnan;
    • Shukla, Ajay;
    • Gupta, Ishan;
    • Verma, Pranshu;
    • Dhar, Joydip
    Publication type:
    Article
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50