-
1
-
2
SHaPe: A Honeypot for Electric Power Substation
Published 2015-12-01Subjects: Get full text
Article -
3
-
4
Game Theoretic Honeypot Deployment in Smart Grid
Published 2020-07-01Subjects: Get full text
Article -
5
Early Intrusion Detection System using honeypot for industrial control networks
Published 2022-12-01Subjects: Get full text
Article -
6
Analyses of malicious software long term activity – a case study
Published 2024-11-01Subjects: “…honeypots…”
Get full text
Article -
7
An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices
Published 2024-10-01Subjects: Get full text
Article -
8
Dynamical model and analysis of malware propagation on the dynamically-deployed heterogeneous honeynet
Published 2022-01-01Subjects: “…dynamically-deployed honeypots…”
Get full text
Article -
9
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypotsMendeley Data
Published 2025-02-01Subjects: “…Honeypots dataset…”
Get full text
Article -
10
Optimal honeynet configuration in enterprise computer networks
Published 2013-12-01Subjects: Get full text
Article -
11
Hornet 40: Network dataset of geographically placed honeypots
Published 2022-02-01Subjects: “…Honeypots dataset…”
Get full text
Article -
12
Cyberpsychology: A Longitudinal Analysis of Cyber Adversarial Tactics and Techniques
Published 2023-08-01Subjects: “…honeypots…”
Get full text
Article -
13
A Meta-Classification Model for Optimized ZBot Malware Prediction Using Learning Algorithms
Published 2023-06-01Subjects: “…honeypots…”
Get full text
Article -
14
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles
Published 2022-01-01Subjects: “…Honeypots…”
Get full text
Article -
15
Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks
Published 2022-10-01Subjects: Get full text
Article -
16
AI-Based Holistic Framework for Cyber Threat Intelligence Management
Published 2025-01-01Subjects: Get full text
Article -
17
Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions
Published 2022-03-01Subjects: Get full text
Article -
18
The sweet taste of IoT deception: an adaptive honeypot framework for design and evaluation
Published 2024-11-01Subjects: “…adaptive honeypots…”
Get full text
Article -
19
Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis
Published 2013-04-01Subjects: “…Low interaction honeypot…”
Get full text
Article -
20
A Comparison of an Adaptive Self-Guarded Honeypot with Conventional Honeypots
Published 2022-05-01Subjects: “…adaptive honeypot…”
Get full text
Article