-
1
-
-
33750376598
-
The nepenthes platform: An efficient approach to collect malware
-
Springer
-
P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling. The nepenthes platform: An efficient approach to collect malware. In Recent Advances in Intrusion Detection, pages 165-184. Springer, 2006.
-
(2006)
Recent Advances in Intrusion Detection
, pp. 165-184
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
-
2
-
-
84906220043
-
Heartbleed 101
-
M. Carvalho, J. Demott, R. Ford, and W. David. Heartbleed 101. Security & Privacy, IEEE, 12(4):63-67, 2014.
-
(2014)
Security & Privacy IEEE
, vol.12
, Issue.4
, pp. 63-67
-
-
Carvalho, M.1
Demott, J.2
Ford, R.3
David, W.4
-
3
-
-
83455219583
-
Securing collaborative intrusion detection systems
-
S. Cheung. Securing collaborative intrusion detection systems. IEEE Security and Privacy, 9(6):36-42, 2011.
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.6
, pp. 36-42
-
-
Cheung, S.1
-
5
-
-
79960556588
-
Alert correlation in collaborative intelligent intrusion detection systems-A survey
-
Oct
-
H. T. Elshoush and I. M. Osman. Alert correlation in collaborative intelligent intrusion detection systems-A survey. Applied Soft Computing, 11(7):4349-4365, Oct. 2011.
-
(2011)
Applied Soft Computing
, vol.11
, Issue.7
, pp. 4349-4365
-
-
Elshoush, H.T.1
Osman, I.M.2
-
6
-
-
54849431370
-
OpenStreetMap: User-generated street maps. Pervasive computing
-
M. Haklay and P. Weber. OpenStreetMap: User-Generated Street Maps. Pervasive Computing. IEEE Pervasive Computing, 7(4):12-18, 2008.
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.4
, pp. 12-18
-
-
Haklay, M.1
Weber, P.2
-
7
-
-
79960561313
-
Collaborating against common enemies
-
New York, New York, USA, ACM Press
-
S. Katti, B. Krishnamurthy, and D. Katabi. Collaborating against common enemies. In 5th ACM SIGCOMM Conference on Internet Measurement-IMC, New York, New York, USA, 2005. ACM Press.
-
(2005)
5th ACM SIGCOMM Conference on Internet Measurement-IMC
-
-
Katti, S.1
Krishnamurthy, B.2
Katabi, D.3
-
9
-
-
84906993229
-
Honeypots deployment for the analysis and visualization of malware activity and malicious connections
-
IEEE
-
I. Koniaris, G. Papadimitriou, P. Nicopolitidis, and M. Obaidat. Honeypots deployment for the analysis and visualization of malware activity and malicious connections. In International Conference on Communications (ICC), pages 1819-1824. IEEE, 2014.
-
(2014)
International Conference on Communications (ICC)
, pp. 1819-1824
-
-
Koniaris, I.1
Papadimitriou, G.2
Nicopolitidis, P.3
Obaidat, M.4
-
14
-
-
67349147317
-
Security against probe-response attacks in collaborative intrusion detection
-
New York, New York, USA, ACM
-
V. Shmatikov and M.-H. Wang. Security against probe-response attacks in collaborative intrusion detection. In Workshop on Large scale attack defense-LSAD, pages 129-136, New York, New York, USA, 2007. ACM.
-
(2007)
Workshop on Large Scale Attack Defense-LSAD
, pp. 129-136
-
-
Shmatikov, V.1
Wang, M.-H.2
-
15
-
-
84903529555
-
Study of internet threats and attack methods using honeypots and honeynets
-
Springer
-
T. Sochor and M. Zuzcak. Study of internet threats and attack methods using honeypots and honeynets. In Computer Networks, pages 118-127. Springer, 2014.
-
(2014)
Computer Networks
, pp. 118-127
-
-
Sochor, T.1
Zuzcak, M.2
-
17
-
-
78149255825
-
Node. Js: Using javascript to build high-performance network programs
-
S. Tilkov and S. Vinoski. Node. js: Using javascript to build high-performance network programs. IEEE Internet Computing, 14(6):0080-83, 2010.
-
(2010)
IEEE Internet Computing
, vol.14
, Issue.6
, pp. 0080-83
-
-
Tilkov, S.1
Vinoski, S.2
-
18
-
-
84889035895
-
This network is infected: HosTaGe - A low-interaction honeypot for mobile devices
-
ACM
-
E. Vasilomanolakis, S. Karuppayah, M. Fischer, M. Mühlhäuser, M. Plasoianu, L. Pandikow, and W. Pfeiffer. This Network is Infected: HosTaGe-a Low-Interaction Honeypot for Mobile Devices. In Security and privacy in smartphones & mobile devices, pages 43-48. ACM, 2013.
-
(2013)
Security and Privacy in Smartphones & Mobile Devices
, pp. 43-48
-
-
Vasilomanolakis, E.1
Karuppayah Fischer M, S.2
Mühlhäuser, M.3
Plasoianu, M.4
Pandikow, L.5
Pfeiffer, W.6
-
20
-
-
84930153452
-
Taxonomy and survey of collaborative intrusion detection
-
E. Vasilomanolakis, S. Karuppayah, M. Mühlhäuser, and M. Fischer. Taxonomy and Survey of Collaborative Intrusion Detection. ACM Computing Surveys, 47(4):33, 2015.
-
(2015)
ACM Computing Surveys
, vol.47
, Issue.4
, pp. 33
-
-
Vasilomanolakis, E.1
Karuppayah, S.2
Mühlhäuser, M.3
Fischer, M.4
|