Academic literature on the topic 'Honeypots'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Honeypots.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Honeypots"
Cheng, Kai, Zhan Wu, Dongkun Li, Xin Li, and Mu Ren. "The TaintDroid Based Honeypot Monitoring System for Embedded Device." Journal of Physics: Conference Series 2203, no. 1 (2022): 012077. http://dx.doi.org/10.1088/1742-6596/2203/1/012077.
Full textStrogov, Vladimir, and Sergey Ulasen. "Leveraging generative AI for dynamic file honeypots: Insights and implementation." Cyber Security: A Peer-Reviewed Journal 8, no. 4 (2025): 392. https://doi.org/10.69554/ztax4067.
Full textYang, Xingyuan, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang, and Jinyu Zhao. "A Highly Interactive Honeypot-Based Approach to Network Threat Management." Future Internet 15, no. 4 (2023): 127. http://dx.doi.org/10.3390/fi15040127.
Full textLi, Yang, Leyi Shi, and Haijie Feng. "A Game-Theoretic Analysis for Distributed Honeypots." Future Internet 11, no. 3 (2019): 65. http://dx.doi.org/10.3390/fi11030065.
Full textLanz, Stefanie, Sarah Lily-Rose Pignol, Patrick Schmitt, et al. "Optimizing Internet of Things Honeypots with Machine Learning: A Review." Applied Sciences 15, no. 10 (2025): 5251. https://doi.org/10.3390/app15105251.
Full textMorić, Zlatan, Vedran Dakić, and Damir Regvart. "Advancing Cybersecurity with Honeypots and Deception Strategies." Informatics 12, no. 1 (2025): 14. https://doi.org/10.3390/informatics12010014.
Full textKatakwar, Harsh, Shashank Uttrani, Palvi Aggarwal, and Varun Dutt. "Influence of different honeypot proportions on adversarial decisions in a deception game." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 120–24. http://dx.doi.org/10.1177/1071181322661120.
Full textČisar, Petar. "The Place and Role of Honeypot Solutions in Network Intrusion Detection Systems." IPSI Transactions on Internet Research Volume 21, Issue 2 (2025): 107. https://doi.org/10.58245/ipsi.tir.2503.11.
Full textTouch, Sereysethy, and Jean-Noël Colin. "A Comparison of an Adaptive Self-Guarded Honeypot with Conventional Honeypots." Applied Sciences 12, no. 10 (2022): 5224. http://dx.doi.org/10.3390/app12105224.
Full textDOSKU, Lediano. "Honeypots, for a more secure network." Ingenious 4, no. 1 (2024): 66–83. http://dx.doi.org/10.58944/zsqz4632.
Full textDissertations / Theses on the topic "Honeypots"
Akkaya, Deniz, and Fabien Thalgott. "Honeypots in network security." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.
Full textYahyaoui, Aymen. "Testing deceptive honeypots." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/44032.
Full textChristoffersen, Dag, and Bengt Jonny Mauland. "Worm Detection Using Honeypots." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9454.
Full textBergande, Eirik Falk Georg, and Jon Fjeldberg Smedsrud. "Using Honeypots to Analyze Bots and Botnets." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9566.
Full textAlmotairi, Saleh Ibrahim Bakr. "Using honeypots to analyse anomalous Internet activities." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/31833/1/Saleh_Almotairi_Thesis.pdf.
Full textLim, Sze Li Harry. "Assessing the effects of honeypots on cyber-attackers." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FLim%5FSze.pdf.
Full textAlosefer, Yaser. "Analysing web-based malware behaviour through client honeypots." Thesis, Cardiff University, 2012. http://orca.cf.ac.uk/29469/.
Full textWagener, Gérard. "Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2011. http://tel.archives-ouvertes.fr/tel-00627981.
Full textWagener, Gérard. "Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour." Electronic Thesis or Diss., Vandoeuvre-les-Nancy, INPL, 2011. http://www.theses.fr/2011INPL037N.
Full textChairetakis, Eleftherios, Bassam Alkudhir, and Panagiotis Mystridis. "Deployment of Low Interaction Honeypots in University Campus Network." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22141.
Full textBooks on the topic "Honeypots"
1882-1956, Milne A. A., ed. Disney's Pooh's five little honeypots. Mouse Works, 1998.
Find full textAnjali, Sardana, ed. Honeypot: A new paradigm to information security. Science Publishers, 2011.
Find full textPeter, Avis, and Blackham Stuart, eds. Honeypot: A teacher's guide to primary technology. 2nd ed. Resource, 1994.
Find full textNG, Chee Keong, Lei Pan, and Yang Xiang. Honeypot Frameworks and Their Applications: A New Framework. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7739-5.
Full textBodmer, E. The electric honeypot: The profitability of deregulated electric generation companies. American Public Power Association, 2007.
Find full textBook chapters on the topic "Honeypots"
Ng, Chee Keong, Lei Pan, and Yang Xiang. "Design Honeypots." In Honeypot Frameworks and Their Applications: A New Framework. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7739-5_2.
Full textWatters, Paul A. "Honeypots and Deception." In Cybercrime and Cybersecurity. CRC Press, 2023. http://dx.doi.org/10.1201/9781003406730-12.
Full textRahalkar, Sagar Ajay. "IDSes, Firewalls, and Honeypots." In Certified Ethical Hacker (CEH) Foundation Guide. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2325-3_13.
Full textFernandez, Gerardo, Ana Nieto, and Javier Lopez. "Modeling Malware-driven Honeypots." In Trust, Privacy and Security in Digital Business. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64483-7_9.
Full textPerkins, Robert C., and C. Jordan Howell. "Honeypots for Cybercrime Research." In Researching Cybercrimes. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74837-1_12.
Full textIhanus, Jouni, and Tero Kokkonen. "Modelling Medical Devices with Honeypots." In Lecture Notes in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65726-0_26.
Full textSimões, Paulo, Tiago Cruz, Jorge Proença, and Edmundo Monteiro. "Specialized Honeypots for SCADA Systems." In Intelligent Systems, Control and Automation: Science and Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2_16.
Full textDagon, David, Xinzhou Qin, Guofei Gu, et al. "HoneyStat: Local Worm Detection Using Honeypots." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30143-1_3.
Full textDutta, Nitul, Nilesh Jadav, Nirali Dutiya, and Dhara Joshi. "Using Honeypots for ICS Threats Evaluation." In Recent Developments on Industrial Control Systems Resilience. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_9.
Full textBhagat, Neeraj, and Bhavna Arora. "Honeypots and Its Deployment: A Review." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2285-3_59.
Full textConference papers on the topic "Honeypots"
Guan, Chongqi, Guohong Cao, and Sencun Zhu. "HoneyLLM: Enabling Shell Honeypots with Large Language Models." In 2024 IEEE Conference on Communications and Network Security (CNS). IEEE, 2024. http://dx.doi.org/10.1109/cns62487.2024.10735663.
Full textAradi, Zoltán, and Anna Bánáti. "The Role of Honeypots in Modern Cybersecurity Strategies." In 2025 IEEE 23rd World Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2025. https://doi.org/10.1109/sami63904.2025.10883300.
Full textHegedüs, Dániel László, Ádám Balogh, Máté Érsok, László Erdődi, Lajos Olcsák, and Anna Bánáti. "Beyond Static Defense: Dynamic Honeypots for Proactive Threat Engagement." In 2024 IEEE 18th International Symposium on Applied Computational Intelligence and Informatics (SACI). IEEE, 2024. http://dx.doi.org/10.1109/saci60582.2024.10619764.
Full textChristli, Jason Aljenova, Charles Lim, and Yevonnael Andrew. "AI-Enhanced Honeypots: Leveraging LLM for Adaptive Cybersecurity Responses." In 2024 16th International Conference on Information Technology and Electrical Engineering (ICITEE). IEEE, 2024. https://doi.org/10.1109/icitee62483.2024.10808265.
Full textHernandez y Lopez, Miguel, and Carlos Francisco Lerma Reséndez. "Honeypots: Basic Concepts Classification and Educational Use as Resources in Information Security Education and Courses." In InSITE 2008: Informing Science + IT Education Conference. Informing Science Institute, 2008. http://dx.doi.org/10.28945/3186.
Full textBadrul Anuar, Nor, Omar Zakaria, and Chong Wei Yao. "Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/2955.
Full textMokube, Iyatiti, and Michele Adams. "Honeypots." In the 45th annual southeast regional conference. ACM Press, 2007. http://dx.doi.org/10.1145/1233341.1233399.
Full textKatakwar, Harsh, Palvi Aggarwal, and Varun Dutt. "Modeling the effects of different honeypot proportions in a deception-based security game." In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003727.
Full textAl-Gharabally, Noor, Nosayba El-Sayed, Sara Al-Mulla, and Imtiaz Ahmad. "Wireless honeypots." In the 2009 conference. ACM Press, 2009. http://dx.doi.org/10.1145/1551950.1551969.
Full textGonçalves, Pamela Moura, Fabiano da Silva Santos, Fernando Guerreiro Chemello, and Roben Castagna Lunardi. "Avaliação e comparação de honeypots: auxiliando administradores de rede na escolha e adoção." In Escola Regional de Redes de Computadores. Sociedade Brasileira de Computação - SBC, 2024. https://doi.org/10.5753/errc.2024.4683.
Full textReports on the topic "Honeypots"
Acosta, Jaime, and Valeria Duron. Hands-on Cybersecurity Studies: Network Diversification with Honeypots. DEVCOM Army Research Laboratory, 2022. http://dx.doi.org/10.21236/ad1180067.
Full textJohnson, Jay, Louis Jencka, Timothy Ortiz, et al. Design Considerations for Distributed Energy Resource Honeypots and Canaries. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1821540.
Full textAcosta, Jaime. Hands-on Cybersecurity Studies: Network Diversification Through Dynamic Honeypots. DEVCOM Army Research Laboratory, 2023. http://dx.doi.org/10.21236/ad1203864.
Full text