-
1
-
2
HoneyBow:an automated malware collection tool based on the high-interaction honeypot principle
Published 2007-01-01Subjects: Get full text
Article -
3
Overview on industrial Internet honeynet technology
Published 2024-10-01Subjects: Get full text
Article -
4
Approach to worm early warning based on local victim behavior
Published 2007-01-01Subjects: Get full text
Article -
5
Strategy of container migration and honeypot deployment based on signal game in cloud environment
Published 2022-06-01Subjects: Get full text
Article -
6
Honeypot contract detection of blockchain based on deep learning
Published 2022-01-01Subjects: Get full text
Article -
7
Research on active defense application based on honeypot
Published 2018-01-01Subjects: Get full text
Article -
8
Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks
Published 2022-08-01Subjects: Get full text
Article -
9
Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
Published 2022-11-01Subjects: “…honeypot game…”
Get full text
Article -
10
Research on dynamic array honeypot for collaborative network defense strategy
Published 2012-11-01Subjects: “…dynamic array honeypot…”
Get full text
Article -
11
Design and performance analysis of a SDN-based intelligent and collaborative Honeynet for mobile networks environment
Published 2018-11-01Subjects: “…Honeypot…”
Get full text
Article -
12
Active deception defense method based on dynamic camouflage network
Published 2020-02-01Subjects: “…honeypot,network deception defense…”
Get full text
Article -
13
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Published 2025-02-01Subjects: Get full text
Article -
14
Honeypot contract detection method for Ethereum based on source code structure and graph attention network
Published 2023-09-01Subjects: Get full text
Article -
15
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypotsMendeley Data
Published 2025-02-01Subjects: “…Honeypots dataset…”
Get full text
Article -
16
AI-Based Holistic Framework for Cyber Threat Intelligence Management
Published 2025-01-01Subjects: Get full text
Article