First Page | Document Content | |
---|---|---|
Date: 2009-09-30 11:18:14Computing Client honeypot Honeypot Malware Spyware HoneyMonkey Honeyd Threat Adware Computer network security Cyberwarfare Computer security | 2nd Generation Honeyclients Robert Danford SANS Internet Storm Center Research funded in part with a grant from StillSecure (http://www.stillsecure.com) Author can be reached at:Add to Reading ListSource URL: handlers.dshield.orgDownload Document from Source WebsiteFile Size: 564,98 KBShare Document on Facebook |
OVEANA Global Business Services 123 W. Mills Avenue, Suite 400 El Paso, TXDigital Imaging Servicing LevelDocID: 1pjnK - View Document | |
Appliance X1 xorlab AG c/o ETH Zürich Universitätsstrasse 6DocID: 1nul6 - View Document | |
Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara {gianluca, chris, vigna}@cs.ucsb.eduDocID: 1b1Ew - View Document | |
BadSignal-Reputation-bar.epsDocID: 1aS6A - View Document | |
Proceedings of the APAN – Network Research WorkshopAnalysis of Redirection Caused by Web-based Malware Yuta Takata 1,*, Shigeki Goto 1,* and Tatsuya Mori 2 1 Waseda UniversityOkubo, Shinjuku-ku, Tokyo,DocID: 19Zw7 - View Document |