Honeypot

Results: 237



#Item
171DDoS Black and White “Kungfu” Revealed

DDoS Black and White “Kungfu” Revealed

Add to Reading List

Source URL: korben.info

Language: English - Date: 2014-05-30 10:22:32
172LOOKING FOR A NEEDLE IS A STACK OF NEEDLES Finding problems before they wake you up at night 16TH ANNUAL NEW YORK STATE CYBER SECURITY CONFERENCE JUNE 2013

LOOKING FOR A NEEDLE IS A STACK OF NEEDLES Finding problems before they wake you up at night 16TH ANNUAL NEW YORK STATE CYBER SECURITY CONFERENCE JUNE 2013

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2013-06-11 07:46:40
173Detecting and Deterring Data Exfiltration Executive Briefing Paper February 2014  Data Exfiltration

Detecting and Deterring Data Exfiltration Executive Briefing Paper February 2014 Data Exfiltration

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-06-10 10:45:46
174Detecting and Deterring Data Exfiltration Guide for Implementers February 2014  MWR would like to acknowledge the help and

Detecting and Deterring Data Exfiltration Guide for Implementers February 2014 MWR would like to acknowledge the help and

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-06-10 10:45:29
175Publicity Leaflet for The Malham Mines.pmd

Publicity Leaflet for The Malham Mines.pmd

Add to Reading List

Source URL: www.kirkbymalham.info

Language: English - Date: 2014-04-26 05:50:25
176Colloquium Spring[removed]Computer Science Colloquium Twenty-second Series - Spring 2005 CS DEPARTMENT School of Science & Technology Sonoma State University Prospective Students People Current Classes Catalog & Schedule A

Colloquium Spring[removed]Computer Science Colloquium Twenty-second Series - Spring 2005 CS DEPARTMENT School of Science & Technology Sonoma State University Prospective Students People Current Classes Catalog & Schedule A

Add to Reading List

Source URL: www.cs.sonoma.edu

Language: English - Date: 2010-09-07 14:47:13
177A Virtual Honeypot Framework Niels Provos∗ Google, Inc. [removed] Abstract A honeypot is a closely monitored network decoy

A Virtual Honeypot Framework Niels Provos∗ Google, Inc. [removed] Abstract A honeypot is a closely monitored network decoy

Add to Reading List

Source URL: niels.xtdnet.nl

Language: English - Date: 2004-08-12 13:04:57
178e-Security National ICT Security and Emergency Response Centre Volume 3 NISER’s Quarterly Bulletin

e-Security National ICT Security and Emergency Response Centre Volume 3 NISER’s Quarterly Bulletin

Add to Reading List

Source URL: www.cybersafe.my

Language: English - Date: 2014-06-29 22:08:03
179To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads Sam Small Johns Hopkins University  Joshua Mason

To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads Sam Small Johns Hopkins University Joshua Mason

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:51
180Modelling the costs and benefits of Honeynets Maximillian Dornseif∗ Sascha A. May†

Modelling the costs and benefits of Honeynets Maximillian Dornseif∗ Sascha A. May†

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2012-08-16 12:30:59