Sciweavers

526 search results - page 1 / 106
» Increase honeypot security through data analysis
Sort
View
IJIPM
2010
77views more  IJIPM 2010»
13 years 3 months ago
Increase honeypot security through data analysis
Milad Daliran, Ramin Nassiri
CAINE
2003
13 years 7 months ago
Analysis Tool for Honeypot Systems
The increased utilization of the Internet and the larger number of computers connected to it has brought up a significant security problem. Hackers or crackers have attacked compu...
Terry Griffin
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
13 years 11 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
ACISP
2005
Springer
13 years 11 months ago
An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia
While it is known that wireless networks experience unauthorised connections, little is known about the nature or frequency of the connections. This study seeks to investigate the ...
Phillip Pudney, Jill Slay
SIGIR
2010
ACM
13 years 10 months ago
Uncovering social spammers: social honeypots + machine learning
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community value and related services like search and advert...
Kyumin Lee, James Caverlee, Steve Webb