Works matching Honeypots (Network security)
1
- Future Internet, 2022, v. 14, n. 12, p. 362, doi. 10.3390/fi14120362
- Florea, Răzvan;
- Craus, Mitică
- Article
2
- International Journal of Safety & Security Engineering, 2022, v. 12, n. 6, p. 737, doi. 10.18280/ijsse.120610
- Mudgal, Akshay;
- Bhatia, Shaveta
- Article
3
- International Journal of Simulation: Systems, Science & Technology, 2018, v. 19, n. 4, p. 2.1, doi. 10.5013/IJSSST.a.19.04.02
- Article
4
- ISSA Journal, 2017, v. 15, n. 8, p. 5
- Article
5
- Issues in Information Systems, 2024, v. 25, n. 1, p. 265, doi. 10.48009/1_iis_2024_122
- Holbel, Reilly;
- Yerby, Johnathan;
- Smith, Warner
- Article
6
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2018, v. 70, n. 1, p. 67
- Vasile, Georgiana;
- Cangea, Otilia
- Article
7
- IAENG International Journal of Computer Science, 2025, v. 52, n. 1, p. 90
- Jiali Xue;
- Jianguo Ren;
- Liping Feng;
- Lei Wang
- Article
8
- Multi-Knowledge Electronic Comprehensive Journal For Education & Science Publications (MECSJ), 2020, n. 34, p. 1
- Al-thakafi, Reham;
- Yahya, S.;
- Jamal, Amani T.
- Article
9
- Behavioral Ecology & Sociobiology, 2018, v. 72, n. 10, p. 1, doi. 10.1007/s00265-018-2577-4
- Kelemen, Evan;
- Dornhaus, Anna
- Article
10
- ISSA Journal, 2016, v. 14, n. 11, p. 6
- Article
11
- Folklore Forum, 2013, p. 260
- Nassar, Nader;
- Miller, Grant
- Article
12
- International Arab Journal of Information Technology (IAJIT), 2012, v. 9, n. 5, p. 436
- Mansooril, Masood;
- Zakaria, Omar;
- Gani, Abdullah
- Article
14
- Journal of Cyber Security Technology, 2018, v. 2, n. 2, p. 75, doi. 10.1080/23742917.2018.1495375
- Dowling, Seamus;
- Schukat, Michael;
- Barrett, Enda
- Article
15
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 6, p. 7056, doi. 10.11591/ijece.v13i6.pp7056-7064
- Abualhija, Mwaffaq;
- Al-Shaf’i, Nid’a;
- Turab, Nidal M.;
- Hussein, Abdelrahman
- Article
16
- Future Internet, 2024, v. 16, n. 12, p. 455, doi. 10.3390/fi16120455
- Papazis, Kon;
- Chilamkurti, Naveen
- Article
17
- Journal of Telecommunications & Information Technology, 2016, n. 2, p. 60, doi. 10.26636/jtit.2016.2.720
- Studiawan, Hudan;
- Djanali, Supeno;
- Pratomo, Baskoro Adi
- Article
18
- Journal of Information Science & Engineering, 2012, v. 28, n. 5, p. 911
- Hong-Geun Kim;
- Dongjin Kim;
- Seong-Je Cho;
- Moonju Park;
- Minkyu Park
- Article
19
- Internet of Things (IoT), 2024, v. 5, n. 4, p. 730, doi. 10.3390/iot5040033
- Omar, Amira Hossam Eldin;
- Soubra, Hassan;
- Moulla, Donatien Koulla;
- Abran, Alain
- Article
20
- Informatics, 2025, v. 12, n. 1, p. 14, doi. 10.3390/informatics12010014
- Morić, Zlatan;
- Dakić, Vedran;
- Regvart, Damir
- Article
21
- Applied Sciences (2076-3417), 2025, v. 15, n. 10, p. 5251, doi. 10.3390/app15105251
- Lanz, Stefanie;
- Pignol, Sarah Lily-Rose;
- Schmitt, Patrick;
- Wang, Haochen;
- Papaioannou, Maria;
- Choudhary, Gaurav;
- Dragoni, Nicola
- Article
22
- International Journal of Network Management, 2016, v. 26, n. 3, p. 156, doi. 10.1002/nem.1923
- Jiang, Ci‐Bin;
- Liu, I‐Hsien;
- Chung, Yao‐Nien;
- Li, Jung‐Shian
- Article
23
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2018, v. 70, n. 1, p. 45
- Article
24
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 9, p. 4512, doi. 10.3837/tiis.2018.09.021
- Erdem, Ömer;
- Pektaş, Abdurrahman;
- Kara, Mehmet
- Article
25
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 1, p. 484, doi. 10.3837/tiis.2017.01.026
- Yixun Hu;
- Kangfeng Zheng;
- Xu Wang;
- Yixian Yang
- Article
26
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 1, p. 38, doi. 10.1049/iet-ifs.2015.0256
- Fan, Wenjun;
- Fernández, David;
- Du, Zhihui
- Article
27
- International Journal of System & Software Engineering, 2015, v. 3, n. 2, p. 10, doi. 10.21863/ijsse/2015.3.2.006
- Kapse, Dinesh S.;
- Bagdi, Vijay
- Article
28
- Mapana Journal of Sciences, 2022, v. 21, n. 4, p. 1, doi. 10.12723/mjs.63.6
- Pahal, Sudesh;
- Priya, Preity
- Article
29
- Criminology & Public Policy, 2017, v. 16, n. 3, p. 727, doi. 10.1111/1745-9133.12314
- Article
30
- Criminology & Public Policy, 2017, v. 16, n. 3, p. 739, doi. 10.1111/1745-9133.12315
- Article
31
- Criminology & Public Policy, 2017, v. 16, n. 3, p. 689, doi. 10.1111/1745-9133.12312
- Testa, Alexander;
- Maimon, David;
- Sobesto, Bertrand;
- Cukier, Michel
- Article
32
- International Journal of Electronics & Telecommunications, 2024, v. 70, n. 4, p. 1099, doi. 10.24425/ijet.2024.152512
- Cabaj, Krzytof;
- Wysota, Witold;
- Grochowski, Konrad;
- Gawkowski, Piotr
- Article
33
- Military Engineer / Hadmérnök, 2012, v. 7, n. 2, p. 312
- Article
34
- Military Engineer / Hadmérnök, 2011, v. 6, n. 4, p. 239
- Article
35
- Computing & Informatics, 2017, v. 36, n. 1, p. 113, doi. 10.4149/cai_2017_1_113
- CHOVANCOVÁ, Eva;
- ÁDÁM, Norbert;
- BALÁŽ, Anton;
- PIETROKOVÁ, Emília;
- FECIĽAK, Peter;
- ŠIMOŇÁK, Slavomír;
- CHOVANEC, Martin
- Article
36
- Multimedia Tools & Applications, 2015, v. 74, n. 20, p. 8791, doi. 10.1007/s11042-013-1487-8
- Article
37
- Wireless Personal Communications, 2018, v. 103, n. 2, p. 1179, doi. 10.1007/s11277-018-5307-3
- Gandhi, Usha Devi;
- Kumar, Priyan Malarvizhi;
- Kadu, Shreyas;
- Varatharajan, R.;
- Manogaran, Gunasekaran;
- Sundarasekar, Revathi
- Article
38
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 1965, doi. 10.1007/s11277-016-3298-5
- Rajarajan, G.;
- Ganesan, Lakshmanan
- Article
39
- Wireless Personal Communications, 2016, v. 90, n. 2, p. 831, doi. 10.1007/s11277-016-3229-5
- Article
40
- Wireless Personal Communications, 2014, v. 78, n. 2, p. 995, doi. 10.1007/s11277-014-1797-9
- Tapaswi, Shashikala;
- Mahboob, Adnan;
- Shukla, Ajay;
- Gupta, Ishan;
- Verma, Pranshu;
- Dhar, Joydip
- Article
41
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2016, v. 19, n. 2, p. 415, doi. 10.21279/1454-864X-16-I2-062
- EFTIMIE, Sergiu;
- RĂCUCIU, Ciprian
- Article
42
- Mathematics (2227-7390), 2024, v. 12, n. 10, p. 1508, doi. 10.3390/math12101508
- Wang, Le;
- Deng, Jianyu;
- Tan, Haonan;
- Xu, Yinghui;
- Zhu, Junyi;
- Zhang, Zhiqiang;
- Li, Zhaohua;
- Zhan, Rufeng;
- Gu, Zhaoquan
- Article
43
- Reading & Writing (20798245), 2021, v. 12, n. 1, p. 18
- Article
44
- Journal of Electrical & Computer Engineering, 2016, p. 1, doi. 10.1155/2016/5212314
- Basam, Dileep;
- Ransbottom, J. Scot;
- Marchany, Randy;
- Tront, Joseph G.
- Article
45
- International Journal of Simulation: Systems, Science & Technology, 2018, v. 19, n. 4, p. 4.1, doi. 10.5013/IJSSST.a.19.04.04
- Article
46
- International Journal of Simulation: Systems, Science & Technology, 2016, v. 17, n. 47, p. 26.1, doi. 10.5013/IJSSST.a.17.47.26
- Huimin GUO;
- Jiaomin LUO;
- Qian GENG
- Article
47
- Decision Analysis, 2018, v. 15, n. 2, p. 90, doi. 10.1287/deca.2017.0363
- Mai, Bin;
- Kulkarni, Shailesh
- Article
48
- International Journal of Networked & Distributed Computing, 2024, v. 12, n. 2, p. 250, doi. 10.1007/s44227-024-00032-1
- Alharbi, Fares;
- Kashyap, Gautam Siddharth
- Article
49
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 8, p. 929, doi. 10.1049/iet-com.2015.0497
- Selvaraj, Rajalakshmi;
- Kuthadi, Venu Madhav;
- Marwala, Tshilidzi
- Article
50
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 4, p. 30, doi. 10.26483/ijarcs.v9i4.6176
- Article