Sciweavers

436 search results - page 1 / 88
» Honeypots: concepts, approaches, and challenges
Sort
View
ACMSE
2007
ACM
13 years 8 months ago
Honeypots: concepts, approaches, and challenges
Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defense to supplement the exi...
Iyatiti Mokube, Michele Adams
SSS
2009
Springer
143views Control Systems» more  SSS 2009»
13 years 11 months ago
Self Adaptive High Interaction Honeypots Driven by Game Theory
High-interaction honeypots are relevant to provide rich and useful information obtained from attackers. Honeypots come in different flavors with respect to their interaction pote...
Gérard Wagener, Radu State, Alexandre Dulau...
SICHERHEIT
2008
13 years 6 months ago
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
Abstract: Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor's browser are posing a serious threat to client security, comprom...
Ali Ikinci, Thorsten Holz, Felix C. Freiling
ACSAC
2007
IEEE
13 years 11 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
ACL
2008
13 years 6 months ago
A Hierarchical Approach to Encoding Medical Concepts for Clinical Notes
This paper proposes a hierarchical text categorization (TC) approach to encoding free-text clinical notes with ICD-9-CM codes. Preliminary experimental result on the 2007 Computat...
Yitao Zhang