Works matching Honeypots (Network security)


Results: 71
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10

    Steal Me.

    Published in:
    ISSA Journal, 2016, v. 14, n. 11, p. 6
    By:
    • Williams, Branden R.
    Publication type:
    Article
    11
    12
    13
    14
    15
    16
    17

    Graph-based Forensic Analysis of Web Honeypot.

    Published in:
    Journal of Telecommunications & Information Technology, 2016, n. 2, p. 60, doi. 10.26636/jtit.2016.2.720
    By:
    • Studiawan, Hudan;
    • Djanali, Supeno;
    • Pratomo, Baskoro Adi
    Publication type:
    Article
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37

    HIoTPOT: Surveillance on IoT Devices against Recent Threats.

    Published in:
    Wireless Personal Communications, 2018, v. 103, n. 2, p. 1179, doi. 10.1007/s11277-018-5307-3
    By:
    • Gandhi, Usha Devi;
    • Kumar, Priyan Malarvizhi;
    • Kadu, Shreyas;
    • Varatharajan, R.;
    • Manogaran, Gunasekaran;
    • Sundarasekar, Revathi
    Publication type:
    Article
    38
    39
    40

    Markov Chain Based Roaming Schemes for Honeypots.

    Published in:
    Wireless Personal Communications, 2014, v. 78, n. 2, p. 995, doi. 10.1007/s11277-014-1797-9
    By:
    • Tapaswi, Shashikala;
    • Mahboob, Adnan;
    • Shukla, Ajay;
    • Gupta, Ishan;
    • Verma, Pranshu;
    • Dhar, Joydip
    Publication type:
    Article
    41

    HONEYPOT SYSTEM BASED ON SOFTWARE CONTAINERS.

    Published in:
    Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2016, v. 19, n. 2, p. 415, doi. 10.21279/1454-864X-16-I2-062
    By:
    • EFTIMIE, Sergiu;
    • RĂCUCIU, Ciprian
    Publication type:
    Article
    42
    43
    44
    45
    46
    47
    48
    49
    50