Journal articles on the topic 'Client Honeypot'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 16 journal articles for your research on the topic 'Client Honeypot.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
K,, Santhosh. "Design and Implementation of a Honeypot-based Intrusion Detection System for Mitigating SQL Injection-based Botnet Attacks in E-commerce Websites." International Scientific Journal of Engineering and Management 03, no. 04 (2024): 1–9. http://dx.doi.org/10.55041/isjem01620.
Full textJung, Hyun-Mi, Seung-Wan Son, Kwang-Seok Kim, and Gang-Soo Lee. "A High-Interaction Client Honeypot on Android Platform." Journal of Digital Policy and Management 11, no. 12 (2013): 381–86. http://dx.doi.org/10.14400/jdpm.2013.11.12.381.
Full textAKIYAMA, Mitsuaki, Takeshi YAGI, Youki KADOBAYASHI, Takeo HARIU, and Suguru YAMAGUCHI. "Client Honeypot Multiplication with High Performance and Precise Detection." IEICE Transactions on Information and Systems E98.D, no. 4 (2015): 775–87. http://dx.doi.org/10.1587/transinf.2014icp0002.
Full textTati Ernawati and Fikri Faiz Fadhlur Rachmat. "Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 1 (2021): 180–86. http://dx.doi.org/10.29207/resti.v5i1.2825.
Full textAKIYAMA, Mitsuaki, Makoto IWAMURA, Yuhei KAWAKOYA, Kazufumi AOKI, and Mitsutaka ITOH. "Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks." IEICE Transactions on Communications E93-B, no. 5 (2010): 1131–39. http://dx.doi.org/10.1587/transcom.e93.b.1131.
Full textIqbal, Muhammad, Arini Arini, and Hendra Bayu Suseno. "ANALISA DAN SIMULASI KEAMANAN JARINGAN UBUNTU SERVER DENGAN PORT KNOCKING, HONEYPOT, IPTABLES, ICMP." Cyber Security dan Forensik Digital 3, no. 1 (2020): 27–32. http://dx.doi.org/10.14421/csecurity.2020.3.1.1933.
Full textMalar, Benjula Anbu, and Prabhu J. "Data Storage Security in the Cloud Environment Using the Honey Pot System." International Journal of e-Collaboration 16, no. 4 (2020): 1–14. http://dx.doi.org/10.4018/ijec.2020100101.
Full textPapazis, Kon, and Naveen Chilamkurti. "Hydrakon, a Framework for Measuring Indicators of Deception in Emulated Monitoring Systems." Future Internet 16, no. 12 (2024): 455. https://doi.org/10.3390/fi16120455.
Full textMansoori, Masood, and Ray Hunt. "An ISP Based Notification and Detection System to Maximize Efficiency of Client Honeypots in Protection of End Users." International Journal of Network Security & Its Applications 3, no. 5 (2011): 59–73. http://dx.doi.org/10.5121/ijnsa.2011.3505.
Full textNdichu, Samuel, Sangwook Kim, Seiichi Ozawa, Tao Ban, Takeshi Takahashi, and Daisuke Inoue. "Detecting Web-Based Attacks with SHAP and Tree Ensemble Machine Learning Methods." Applied Sciences 12, no. 1 (2021): 60. http://dx.doi.org/10.3390/app12010060.
Full textKour, Kushnian, Subhashish Goswami, Dr Meenakshi Sharma, P. Thiruvannamalai Sivasankar, Dr Vipul Vekariya, and Alka Kumari. "Honeynet Implementation in Cyber Security Attack Prevention with Data Monitoring System Using AI Technique and IoT 4G Networks." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 3 (2022): 163–75. http://dx.doi.org/10.17762/ijcnis.v14i3.5603.
Full textPutra, Adam, and Ade Eviyanti. "Implementation of the Honeypot Method in Form Input Security Against Sql-Injection Attacks." Procedia of Engineering and Life Science 3 (January 17, 2023). http://dx.doi.org/10.21070/pels.v3i0.1336.
Full textMasood, Mansoori, and Hunt Ray. "AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIENT HONEYPOTS IN PROTECTION OF END USERS." September 30, 2011. https://doi.org/10.5121/ijnsa.2011.3505.
Full textArtyushkin, A. "Approaches to Creating the Self-Modifying High Interaction Client Honeypots." Science and Education of the Bauman MSTU 16, no. 08 (2016). http://dx.doi.org/10.7463/0816.0844738.
Full text"Safeguard Clothing and Dive Decrease." International Journal of Innovative Technology and Exploring Engineering 8, no. 9S3 (2019): 1205–7. http://dx.doi.org/10.35940/ijitee.i3265.0789s319.
Full textJean-François, Lalande, Rodriguez David, and Toinard Christian. "SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK." October 31, 2009. https://doi.org/10.5281/zenodo.1246367.
Full text