Sciweavers

3 search results - page 1 / 1
» On Recognizing Virtual Honeypots and Countermeasures
Sort
View
DASC
2006
IEEE
13 years 10 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
RAID
2007
Springer
13 years 10 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
ROBOCUP
2001
Springer
138views Robotics» more  ROBOCUP 2001»
13 years 9 months ago
Interpretation of Spatio-temporal Relations in Real-Time and Dynamic Environments
With the more sophisticated abilities of teams within the simulation league high level online functions become more and more attractive. Last year we proposed an approach to recogn...
Andrea Miene, Ubbo Visser