Journal articles on the topic 'Honeypots'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Honeypots.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Cheng, Kai, Zhan Wu, Dongkun Li, Xin Li, and Mu Ren. "The TaintDroid Based Honeypot Monitoring System for Embedded Device." Journal of Physics: Conference Series 2203, no. 1 (February 1, 2022): 012077. http://dx.doi.org/10.1088/1742-6596/2203/1/012077.
Full textYang, Xingyuan, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang, and Jinyu Zhao. "A Highly Interactive Honeypot-Based Approach to Network Threat Management." Future Internet 15, no. 4 (March 28, 2023): 127. http://dx.doi.org/10.3390/fi15040127.
Full textLi, Yang, Leyi Shi, and Haijie Feng. "A Game-Theoretic Analysis for Distributed Honeypots." Future Internet 11, no. 3 (March 5, 2019): 65. http://dx.doi.org/10.3390/fi11030065.
Full textKatakwar, Harsh, Shashank Uttrani, Palvi Aggarwal, and Varun Dutt. "Influence of different honeypot proportions on adversarial decisions in a deception game." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (September 2022): 120–24. http://dx.doi.org/10.1177/1071181322661120.
Full textTouch, Sereysethy, and Jean-Noël Colin. "A Comparison of an Adaptive Self-Guarded Honeypot with Conventional Honeypots." Applied Sciences 12, no. 10 (May 21, 2022): 5224. http://dx.doi.org/10.3390/app12105224.
Full textChaudhary, Sachin, and Kanchan Chaudhary. "Distributed Honeypots System." International Journal of Advance Research and Innovation 1, no. 2 (2013): 5–11. http://dx.doi.org/10.51976/ijari.121302.
Full textPanduardi, Farizqi, Herman Yuliandoko, and Agus Priyo Utomo. "Network Security Using Honeypot and Attack Detection with Android Application." Indonesian Journal of Engineering Research 2, no. 2 (November 27, 2021): 53–60. http://dx.doi.org/10.11594/10.11594/ijer.02.02.04.
Full textNagy, Naya, Marius Nagy, Ghadeer Alazman, Zahra Hawaidi, Saja Mustafa Alsulaibikh, Layla Alabbad, Sadeem Alfaleh, and Areej Aljuaid. "Quantum Honeypots." Entropy 25, no. 10 (October 18, 2023): 1461. http://dx.doi.org/10.3390/e25101461.
Full textChamotra, Saurabh, Rakesh Kumar Sehgal, and Ram Swaroop Misra. "Honeypot Baselining for Zero Day Attack Detection." International Journal of Information Security and Privacy 11, no. 3 (July 2017): 63–74. http://dx.doi.org/10.4018/ijisp.2017070106.
Full textAlyas, Tahir, Khalid Alissa, Mohammed Alqahtani, Tauqeer Faiz, Suleiman Ali Alsaif, Nadia Tabassum, and Hafiz Hasan Naqvi. "Multi-Cloud Integration Security Framework Using Honeypots." Mobile Information Systems 2022 (August 17, 2022): 1–13. http://dx.doi.org/10.1155/2022/2600712.
Full textAranjo, Prof Suvarna, Sachin Maurya, Chandrakant Thakur, and Melvin Raju. "Threat Prediction using Honeypot and Machine Learning." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1838–51. http://dx.doi.org/10.22214/ijraset.2022.41016.
Full textMesbah, Mohamed, Mahmoud Said Elsayed, Anca Delia Jurcut, and Marianne Azer. "Analysis of ICS and SCADA Systems Attacks Using Honeypots." Future Internet 15, no. 7 (July 14, 2023): 241. http://dx.doi.org/10.3390/fi15070241.
Full textArkhipova, Anastasiya, and Danila Karevskiy. "Honeypot as a tool for creating an effective secure system." Digital Technology Security, no. 2 (June 25, 2021): 122–35. http://dx.doi.org/10.17212/2782-2230-2021-2-122-135.
Full textBell Bitjoka, Georges, and Antoine Elang. "Network Malware Laboratory BasedOn Honeypots Technologies." Journal of Cybersecurity Research (JCR) 3, no. 1 (December 5, 2018): 1–12. http://dx.doi.org/10.19030/jcr.v3i1.10226.
Full textMühlbach, Sascha, and Andreas Koch. "A Dynamically Reconfigured Multi-FPGA Network Platform for High-Speed Malware Collection." International Journal of Reconfigurable Computing 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/342625.
Full textWang, Le, Jianyu Deng, Haonan Tan, Yinghui Xu, Junyi Zhu, Zhiqiang Zhang, Zhaohua Li, Rufeng Zhan, and Zhaoquan Gu. "AARF: Autonomous Attack Response Framework for Honeypots to Enhance Interaction Based on Multi-Agent Dynamic Game." Mathematics 12, no. 10 (May 11, 2024): 1508. http://dx.doi.org/10.3390/math12101508.
Full textKorchenko, Anna, Vladyslav Breslavskyi, Serhii Yevseiev, Nazym Zhumangalieva, Anatolii Zvarych, Svitlana Kazmirchuk, Oleg Kurchenko, Oleksandr Laptiev, Оleksand Sievierinov, and Sirhii Tkachuk. "Development of a method for constructing linguistic standards for multi-criteria assessment of honeypot efficiency." Eastern-European Journal of Enterprise Technologies 1, no. 2 (109) (February 26, 2021): 14–23. http://dx.doi.org/10.15587/1729-4061.2021.225346.
Full textM.R., Amal, and Venkadesh P. "Review of Cyber Attack Detection: Honeypot System." Webology 19, no. 1 (January 20, 2022): 5497–514. http://dx.doi.org/10.14704/web/v19i1/web19370.
Full textSurber, James Gregory, and Morgan Zantua. "Intelligent Interaction Honeypots for Threat Hunting within the Internet of Things." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (March 8, 2022): 5. http://dx.doi.org/10.53735/cisse.v9i1.147.
Full textMudgal, Akshay, and Shaveta Bhatia. "Spark-Based Network Security Honeypot System: Detailed Performance Analysis." International Journal of Safety and Security Engineering 12, no. 6 (December 31, 2022): 737–43. http://dx.doi.org/10.18280/ijsse.120610.
Full textMacias, Henrry Javier Rentería, Jimmy Fernando Ramírez Márquez, Carlos Simón Plata Cabrera, Jonathan Patricio Cárdenas Ruperti, and Rómulo Sandino Jurado Calero. "Análisis de intrusiones cibernéticas con el uso del Honeypots. Una revisión sistemática / Análise de invasões cibernéticas usando Honeypots. Uma revisão sistemática." Brazilian Applied Science Review 5, no. 6 (December 28, 2021): 2218–48. http://dx.doi.org/10.34115/basrv5n6-012.
Full textWang, Keyong, Mengyao Tong, Dequan Yang, and Yuhang Liu. "A Web-Based Honeypot in IPv6 to Enhance Security." Information 11, no. 9 (September 12, 2020): 440. http://dx.doi.org/10.3390/info11090440.
Full textSeetharam kakaraparthi, Durganjaneyulu immadisetty, and Maranco M. "Enhanced honeypot security for intrusion detection and prevention systems using blockchain." World Journal of Advanced Research and Reviews 22, no. 1 (April 30, 2024): 751–58. http://dx.doi.org/10.30574/wjarr.2024.22.1.1065.
Full textAhmed, Dr Hanaa Mohsin, Dr Nidaa Flaih Hassan, and Assmaa A. Fahad. "A Survey on SmartPhone Honeypot." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 4 (October 15, 2013): 2476–80. http://dx.doi.org/10.24297/ijct.v11i4.3131.
Full textScanlan, Joel, Paul A. Watters, Jeremy Prichard, Charlotte Hunn, Caroline Spiranovic, and Richard Wortley. "Creating Honeypots to Prevent Online Child Exploitation." Future Internet 14, no. 4 (April 14, 2022): 121. http://dx.doi.org/10.3390/fi14040121.
Full textSudha Gadde, Sai, Rama Krishna Srinivas Ganta, ASALG Gopala Gupta, Raghava Rao K, and KRR Mohan Rao. "Securing Internet of Things(IoT) Using HoneyPots." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 820. http://dx.doi.org/10.14419/ijet.v7i2.7.11075.
Full textGao, Yazhuo, Guomin Zhang, and Changyou Xing. "A Multiphase Dynamic Deployment Mechanism of Virtualized Honeypots Based on Intelligent Attack Path Prediction." Security and Communication Networks 2021 (October 21, 2021): 1–15. http://dx.doi.org/10.1155/2021/6378218.
Full textGupta, B. B., and Alisha Gupta. "Assessment of Honeypots." International Journal of Cloud Applications and Computing 8, no. 1 (January 2018): 21–54. http://dx.doi.org/10.4018/ijcac.2018010102.
Full textK,, Santhosh. "Design and Implementation of a Honeypot-based Intrusion Detection System for Mitigating SQL Injection-based Botnet Attacks in E-commerce Websites." International Scientific Journal of Engineering and Management 03, no. 04 (April 23, 2024): 1–9. http://dx.doi.org/10.55041/isjem01620.
Full textPurswani, Gaurav, Raunak Parashar, Hemanth N, Raja Kumar Singh, and Divya C D. "Honey Potting using Containerization Technique." Journal of Network Security Computer Networks 8, no. 2 (July 8, 2022): 46–52. http://dx.doi.org/10.46610/jonscn.2022.v08i02.004.
Full textHermawan, Denni Septian, Syaifuddin Syaifuddin, and Diah Risqiwati. "Analisa Real-Time Data log honeypot menggunakan Algoritma K-Means pada serangan Distributed Denial of Service." Jurnal Repositor 2, no. 5 (March 6, 2020): 541. http://dx.doi.org/10.22219/repositor.v2i5.440.
Full textArbaaz, Adnaan, Vanam Rajkumar, and M. I. "Honeypots: Screening Cyber Attacks." International Journal of Computer Applications 176, no. 22 (May 15, 2020): 53–58. http://dx.doi.org/10.5120/ijca2020920238.
Full textDornseif, M., F. C. Gärtner, and T. Holz. "Vulnerability Assessment using Honeypots." PIK - Praxis der Informationsverarbeitung und Kommunikation 27, no. 4 (December 2004): 195–201. http://dx.doi.org/10.1515/piko.2004.195.
Full textYadav, Aastha, Sarthak Raisurana, and N. Ch Sriman Narayana Iyengar. "Analysis of a Honeypot Intrusion Detection System for Medical and Healthcare Services." Journal of Innovative Technology Convergence 4, no. 1 (June 30, 2022): 49–58. http://dx.doi.org/10.69478/jitc2022v4n1a02.
Full textKirishikesan, Kannan, Gayakantha Jayakody, Ayesh Hallawaarachchi, and Chandana Gamage. "A High-interaction Physics-aware ICS Honeypot for Industrial Environments." International Journal on Advances in ICT for Emerging Regions (ICTer) 16, no. 2 (December 8, 2023): 31–39. http://dx.doi.org/10.4038/icter.v16i2.7265.
Full textAkshay, Akshat Divya, Anchit Bhushan, Nihal Anand, Rishabh Khemka, and Sumithra Devi K.A. "HONEYPOT: Intrusion Detection System." International Journal of Education, Science, Technology, and Engineering 3, no. 1 (April 24, 2020): 13–18. http://dx.doi.org/10.36079/lamintang.ijeste-0301.66.
Full textJagan, Shanmugam, Ashish Ashish, Miroslav Mahdal, Kenneth Ruth Isabels, Jyoti Dhanke, Parita Jain, and Muniyandy Elangovan. "A Meta-Classification Model for Optimized ZBot Malware Prediction Using Learning Algorithms." Mathematics 11, no. 13 (June 24, 2023): 2840. http://dx.doi.org/10.3390/math11132840.
Full textYamamoto, Yudai, and Shingo Yamaguchi. "Defense Mechanism to Generate IPS Rules from Honeypot Logs and Its Application to Log4Shell Attack and Its Variants." Electronics 12, no. 14 (July 21, 2023): 3177. http://dx.doi.org/10.3390/electronics12143177.
Full textGilces Zambrano, Alex Fernando, Viviana Demera Centeno, and Leticia Vaca Cárdenas. "Mecanismos de ciberseguridad basados en honeypots." Informática y Sistemas: Revista de Tecnologías de la Informática y las Comunicaciones 5, no. 2 (December 10, 2021): 1. http://dx.doi.org/10.33936/isrtic.v5i2.3708.
Full textNikolaidis, J. "Honeypots, tracking hackers [Book Reviews]." IEEE Network 17, no. 4 (July 2003): 5. http://dx.doi.org/10.1109/mnet.2003.1220681.
Full textDittrich, David. "The ethics of social honeypots." Research Ethics 11, no. 4 (May 22, 2015): 192–210. http://dx.doi.org/10.1177/1747016115583380.
Full textYu, Tianxiang, Yang Xin, and Chunyong Zhang. "HoneyFactory: Container-Based Comprehensive Cyber Deception Honeynet Architecture." Electronics 13, no. 2 (January 15, 2024): 361. http://dx.doi.org/10.3390/electronics13020361.
Full textManmohan Dagar and Rashmi Popli. "Honeypots: Virtual Network Intrusion Monitoring System." International Journal of Scientific Research in Network Security and Communication 6, no. 2 (April 30, 2018): 45–49. http://dx.doi.org/10.26438/ijsrnsc/v6i2.4549.
Full textM. Sandhya Rani, Guda Ankitha, Polasani Harini, and G Ravi. "Cyber Honeypot." International Journal of Scientific Research in Science and Technology 11, no. 2 (April 2, 2024): 94–98. http://dx.doi.org/10.32628/ijsrst52411168.
Full textKhan, Zeeshan Ali, and Ubaid Abbasi. "Reputation Management Using Honeypots for Intrusion Detection in the Internet of Things." Electronics 9, no. 3 (February 29, 2020): 415. http://dx.doi.org/10.3390/electronics9030415.
Full textTati Ernawati and Fikri Faiz Fadhlur Rachmat. "Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 1 (February 28, 2021): 180–86. http://dx.doi.org/10.29207/resti.v5i1.2825.
Full textRamakrishnaiah, N. "Analysis of Network Intrusion Attacks using Honeypots." International Journal of Computer Applications 182, no. 32 (December 17, 2018): 33–37. http://dx.doi.org/10.5120/ijca2018918255.
Full textAlqubati, Mansour Ali H., Yousef B. Mahdy, and Hosny M. Ibrahim. "WORM DETECTION USING HONEYPOTS FOR WINDOWS ENVIRONMENT." JES. Journal of Engineering Sciences 38, no. 4 (July 1, 2010): 1013–25. http://dx.doi.org/10.21608/jesaun.2010.125560.
Full textZanoramy Ansiry Zakaria, Wira, and Miss Laiha Mat Kiah. "A review of dynamic and intelligent honeypots." ScienceAsia 39S, no. 1 (2013): 1. http://dx.doi.org/10.2306/scienceasia1513-1874.2013.39s.001.
Full textFatima Khan, Nooreen, and M. Mohan. "Cloud security using self-acting spontaneous honeypots." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 243. http://dx.doi.org/10.14419/ijet.v7i2.8.10418.
Full text