First Page | Document Content | |
---|---|---|
Date: 2015-05-25 21:19:32Computer security Antivirus software Client honeypot Malware Rogue software Gumblar HoneyMonkey JavaScript World Wide Web Computing Computer network security Cyberwarfare | BadSignal-Reputation-bar.epsAdd to Reading ListSource URL: people.csail.mit.eduDownload Document from Source WebsiteFile Size: 284,99 KBShare Document on Facebook |
Microsoft Word - Strider_HoneyMonkey_NDSS2006_2-column_Camera_Ready.docDocID: 1exSE - View Document | |
BadSignal-Reputation-bar.epsDocID: 1aS6A - View Document | |
WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios Kevin Zhijie Chen Guofei GuDocID: 11wdB - View Document | |
Microsoft Word - Strider_HoneyMonkey_NDSS2006_2-column_Camera_Ready.docDocID: Xht7 - View Document | |
2nd Generation Honeyclients Robert Danford SANS Internet Storm Center Research funded in part with a grant from StillSecure (http://www.stillsecure.com) Author can be reached at:DocID: PecZ - View Document |