Dissertations / Theses on the topic 'Honeypots'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Honeypots.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Akkaya, Deniz, and Fabien Thalgott. "Honeypots in network security." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.
Full textYahyaoui, Aymen. "Testing deceptive honeypots." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/44032.
Full textChristoffersen, Dag, and Bengt Jonny Mauland. "Worm Detection Using Honeypots." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9454.
Full textBergande, Eirik Falk Georg, and Jon Fjeldberg Smedsrud. "Using Honeypots to Analyze Bots and Botnets." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9566.
Full textAlmotairi, Saleh Ibrahim Bakr. "Using honeypots to analyse anomalous Internet activities." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/31833/1/Saleh_Almotairi_Thesis.pdf.
Full textLim, Sze Li Harry. "Assessing the effects of honeypots on cyber-attackers." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FLim%5FSze.pdf.
Full textAlosefer, Yaser. "Analysing web-based malware behaviour through client honeypots." Thesis, Cardiff University, 2012. http://orca.cf.ac.uk/29469/.
Full textWagener, Gérard. "Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2011. http://tel.archives-ouvertes.fr/tel-00627981.
Full textWagener, Gérard. "Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour." Electronic Thesis or Diss., Vandoeuvre-les-Nancy, INPL, 2011. http://www.theses.fr/2011INPL037N.
Full textChairetakis, Eleftherios, Bassam Alkudhir, and Panagiotis Mystridis. "Deployment of Low Interaction Honeypots in University Campus Network." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22141.
Full textSalam, Haris. "Cyber Ranges: A design and implementation of Virtual Honeypots." Thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-137108.
Full textKulle, Linus. "Intrusion Attack & Anomaly Detection in IoT Using Honeypots." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20676.
Full textPonten, Austin. "Evaluation of Low-Interaction Honeypots on the University Network." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-66885.
Full textDuong, Binh T. "Comparisons of attacks on honeypots with those on real networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FDuong.pdf.
Full textSteding-Jessen, Klaus. "Uso de honeypots para o estudo de spam e phishing." Instituto Nacional de Pesquisas Espaciais, 2008. http://urlib.net/sid.inpe.br/mtc-m18@80/2008/08.18.19.02.
Full textSemrau, Florian. "Honeypots Aufbau und Integration in ein Testnetzwerk, Analyse der Leistungsmerkmale." Saarbrücken VDM Verlag Dr. Müller, 2007. http://d-nb.info/991172094/04.
Full textBarbato, Luiz Gustavo Cunha. "Monitoração de atividades em máquinas preparadas para serem comprometidas (Honeypots)." Instituto Nacional de Pesquisas Espaciais, 2004. http://urlib.net/sid.inpe.br/jeferson/2004/07.22.15.13.
Full textKedrowitsch, Alexander Lee. "Deceptive Environments for Cybersecurity Defense on Low-power Devices." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/86164.
Full textGuerra, Pedro Henrique Calais. "Identificação e caracterização de campanhas de spam a partir de honeypots." Universidade Federal de Minas Gerais, 2009. http://hdl.handle.net/1843/BUBD-9JTMUS.
Full textCabral, Warren. "Architectural analysis and customised deployment of deceptive cowrie and conpot honeypots." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2021. https://ro.ecu.edu.au/theses/2468.
Full textWatkins, Trevor U. "Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1244659206.
Full textKula, Michal Damian. "Implementing Honeypots to Build Risk Profiles for IoT Devices in a Home-Based Environment." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-86513.
Full textAkif, Omar Zeyad. "Secure authentication procedures based on timed passwords, honeypots, honeywords and multi-factor techniques." Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/16124.
Full textFerreira, Pedro Henrique Matheus da Costa. "Análise de dados de bases de honeypots: estatística descritiva e regras de IDS." Universidade Presbiteriana Mackenzie, 2015. http://tede.mackenzie.br/jspui/handle/tede/1460.
Full textHoepers, Cristine. "Projeto e implementação de uma infra-estrutura para troca e análise de informações de honeypots e honeynets." Instituto Nacional de Pesquisas Espaciais, 2008. http://urlib.net/sid.inpe.br/mtc-m18@80/2008/08.21.12.34.
Full textMarinakis, Alexandros. "A Systematic Comparison of Default based Versus Hardened IoT Systems Using Honeypots : Master Thesis | Supervisor: Maria Papadaki." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-83187.
Full textPrathapani, Anoosha. "Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348.
Full textBarros, Eduardo Gomes de. "Uso de técnicas de análise de séries temporais para prever o comportamento do ruído de fundo na internet brasileira usando dados do consórcio brasileiro de honeypots." Instituto Nacional de Pesquisas Espaciais, 2010. http://urlib.net/sid.inpe.br/mtc-m19/2010/10.15.13.35.
Full textOLIVEIRA, Antonio Alfredo Pires. "SAMARA SOCIEDADE DE AGENTES PARA A MONITORAÇÃO DE ATAQUES E RESPOSTAS AUTOMATIZADAS." Universidade Federal do Maranhão, 2005. http://tedebc.ufma.br:8080/jspui/handle/tede/388.
Full textMedeiros, Jo?o Paulo de Souza. "Identifica??o remota de sistemas operacionais utilizando an?lise de processos aleat?rios e redes neurais artificiais." Universidade Federal do Rio Grande do Norte, 2009. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15287.
Full textBuriánek, Adam. "Bezpečnostní technologie: Honeypot." Master's thesis, Česká zemědělská univerzita v Praze, 2016. http://www.nusl.cz/ntk/nusl-259876.
Full textGaletka, Josef. "Analýza síťových útoků pomocí honeypotů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237123.
Full textFairbanks, Kevin D. "Forensic framework for honeypot analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33977.
Full textPepakayala, Sagar. "Contributions of honeyports to network security." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9177.
Full textKrula, Jiří. "Monitorování síťových útoků pomocí systémů honeypot." Master's thesis, Česká zemědělská univerzita v Praze, 2016. http://www.nusl.cz/ntk/nusl-259320.
Full textŘezáč, Michal. "Honeypot pro rodinu bezdrátových komunikačních protokolů IEEE 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413089.
Full textBláha, Lukáš. "Analýza automatizovaného generování signatur s využitím Honeypotu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236430.
Full textРусанов, Г. О., та О. І. Федюшин. "Збір та аналіз даних з мережі Honeypot". Thesis, ХНУРЕ, 2021. https://openarchive.nure.ua/handle/document/15748.
Full textJacel, Tomasz Wojciech. "Implementation of a honeypot for vehicular communications." Master's thesis, Universidade de Aveiro, 2011. http://hdl.handle.net/10773/6761.
Full textBerthier, Robin G. "Advanced honeypot architecture for network threats quantification." College Park, Md. : University of Maryland, 2009. http://hdl.handle.net/1903/9204.
Full textKarger, David. "Moderní služby honeypot/honeynet pro klasické informační sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-412981.
Full textBasam, Dileep Kumar. "Strengthening MT6D Defenses with Darknet and Honeypot capabilities." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/64375.
Full textSchoeman, Adam. "Amber : a aero-interaction honeypot with distributed intelligence." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017938.
Full textKubiš, Juraj. "SS7 Honeypoty - proaktivní ochrana proti podvodům v mobilních sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-432453.
Full textFrederick, Erwin E. "Testing a low-interaction honeypot against live cyber attackers." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5600.
Full textOLIVEIRA, Vladimir Bezerra de. "HoneypotLabsac: um Framework de Honeypot Virtual para o Android." Universidade Federal do Maranhão, 2012. http://tedebc.ufma.br:8080/jspui/handle/tede/493.
Full textTamagna-Darr, Lucas. "Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /." Online version of thesis, 2009. http://hdl.handle.net/1850/10837.
Full textIzagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.
Full textMOURA, Eduardo Henrique de Carvalho. "MODELO DE SEGURANÇA AUTONÔMICA PARA COMPUTAÇÃO EM NUVEM COM USO DE HONEYPOT." Universidade Federal do Maranhão, 2013. http://tedebc.ufma.br:8080/jspui/handle/tede/516.
Full textBen, Mustapha Yosra. "Alert correlation towards an efficient response decision support." Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0007/document.
Full text