Advanced Cowrie Configuration to Increase Honeypot Deceptiveness (Englisch)
- Neue Suche nach: Cabral, Warren Z.
- Weitere Informationen zu Cabral, Warren Z.:
- https://orcid.org/http://orcid.org/0000-0002-5270-0020
- Neue Suche nach: Valli, Craig
- Weitere Informationen zu Valli, Craig:
- https://orcid.org/http://orcid.org/0000-0002-2298-9791
- Neue Suche nach: Sikos, Leslie F.
- Weitere Informationen zu Sikos, Leslie F.:
- https://orcid.org/http://orcid.org/0000-0003-3368-2215
- Neue Suche nach: Wakeling, Samuel G.
- Weitere Informationen zu Wakeling, Samuel G.:
- https://orcid.org/http://orcid.org/0000-0002-7675-5659
- Neue Suche nach: Jøsang, Audun
- Weitere Informationen zu Jøsang, Audun:
- https://orcid.org/https://orcid.org/0000-0001-6337-2264
- Neue Suche nach: Futcher, Lynn
- Weitere Informationen zu Futcher, Lynn:
- https://orcid.org/https://orcid.org/0000-0003-0406-8718
- Neue Suche nach: Hagen, Janne
- Weitere Informationen zu Hagen, Janne:
- https://orcid.org/https://orcid.org/0000-0001-5900-7061
- Neue Suche nach: Cabral, Warren Z.
- Weitere Informationen zu Cabral, Warren Z.:
- https://orcid.org/http://orcid.org/0000-0002-5270-0020
- Neue Suche nach: Valli, Craig
- Weitere Informationen zu Valli, Craig:
- https://orcid.org/http://orcid.org/0000-0002-2298-9791
- Neue Suche nach: Sikos, Leslie F.
- Weitere Informationen zu Sikos, Leslie F.:
- https://orcid.org/http://orcid.org/0000-0003-3368-2215
- Neue Suche nach: Wakeling, Samuel G.
- Weitere Informationen zu Wakeling, Samuel G.:
- https://orcid.org/http://orcid.org/0000-0002-7675-5659
In:
ICT Systems Security and Privacy Protection
: 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings
;
Kapitel: 21
;
317-331
;
2021
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Advanced Cowrie Configuration to Increase Honeypot Deceptiveness
-
Weitere Titelangaben:IFIP Advs Information
-
Beteiligte:Jøsang, Audun ( Herausgeber:in ) / Futcher, Lynn ( Herausgeber:in ) / Hagen, Janne ( Herausgeber:in ) / Cabral, Warren Z. ( Autor:in ) / Valli, Craig ( Autor:in ) / Sikos, Leslie F. ( Autor:in ) / Wakeling, Samuel G. ( Autor:in )
-
Kongress:IFIP International Conference on ICT Systems Security and Privacy Protection ; 2021 ; Oslo, Norway
-
Erschienen in:ICT Systems Security and Privacy Protection : 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings ; Kapitel: 21 ; 317-331IFIP Advances in Information and Communication Technology ; 625 ; 317-331
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:15.06.2021
-
Format / Umfang:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in GermanyHöller, Paul / Krumeich, Alexander / Lo Iacono, Luigi et al. | 2021
- 2
-
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education CredentialsMore, Stefan / Grassberger, Peter / Hörandner, Felix / Abraham, Andreas / Klausner, Lukas Daniel et al. | 2021
- 3
-
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable CredentialsHariri, Ali / Bandopadhyay, Subhajit / Rizos, Athanasios / Dimitrakos, Theo / Crispo, Bruno / Rajarajan, Muttukrishnan et al. | 2021
- 4
-
A Performance Assessment of Free-to-Use Vulnerability Scanners - RevisitedAraújo, Ricardo / Pinto, António / Pinto, Pedro et al. | 2021
- 5
-
QuickBCC: Quick and Scalable Binary Vulnerable Code Clone DetectionJang, Hajin / Yang, Kyeongseok / Lee, Geonwoo / Na, Yoonjong / Seideman, Jeremy D. / Luo, Shoufu / Lee, Heejo / Dietrich, Sven et al. | 2021
- 6
-
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router FirmwareCheng, Kai / Fang, Dongliang / Qin, Chuan / Wang, Huizhao / Zheng, Yaowen / Yu, Nan / Sun, Limin et al. | 2021
- 7
-
ESQABE: Predicting Encrypted Search QueriesMeers, Isaac / Di Martino, Mariano / Quax, Peter / Lamotte, Wim et al. | 2021
- 8
-
Reconnection-Based Covert Channels in Wireless NetworksZillien, Sebastian / Wendzel, Steffen et al. | 2021
- 9
-
Minecraft Altered Skin Channel (MASC)Abrams, Sam / Keller, Brandon / Nero, Kenneth / Placella, Gino / Johnson, Daryl et al. | 2021
- 10
-
Lattice-Based Weak Curve Fault Attack on ECDSACao, Weiqiong / Shi, Hongsong / Chen, Hua / Wei, Wei / Chen, Jiazhe et al. | 2021
- 11
-
HyperSec: Visual Analytics for Blockchain Security MonitoringPutz, Benedikt / Böhm, Fabian / Pernul, Günther et al. | 2021
- 12
-
100 Popular Open-Source Infosec ToolsKaksonen, Rauli / Järvenpää, Tommi / Pajukangas, Jukka / Mahalean, Mihai / Röning, Juha et al. | 2021
- 13
-
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME AdministratorsWazan, Ahmad Samer / Chadwick, David W. / Venant, Remi / Laborde, Romain / Benzekri, Abdelmalek et al. | 2021
- 14
-
Accept All: The Landscape of Cookie Banners in Greece and the UKKampanos, Georgios / Shahandashti, Siamak F. et al. | 2021
- 15
-
The AppChk Crowd-Sourcing Platform: Which Third Parties are iOS Apps Talking To?Geier, Oleg / Herrmann, Dominik et al. | 2021
- 16
-
Compiling Personal Data and Subject Categories from App Data ModelsBurkert, Christian / Blochberger, Maximilian / Federrath, Hannes et al. | 2021
- 17
-
Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-AppPape, Sebastian / Harborth, David / Kröger, Jacob Leon et al. | 2021
- 18
-
Perceived Privacy Problems Within Digital Contact Tracing: A Study Among Swedish CitizensPadyab, Ali / Kävrestad, Joakim et al. | 2021
- 19
-
Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC SecurityLee, Junwon / Lee, Heejo et al. | 2021
- 20
-
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol EncryptionŠpaček, Stanislav / Tovarňák, Daniel / Čeleda, Pavel et al. | 2021
- 21
-
Advanced Cowrie Configuration to Increase Honeypot DeceptivenessCabral, Warren Z. / Valli, Craig / Sikos, Leslie F. / Wakeling, Samuel G. et al. | 2021
- 22
-
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software SystemsBüttner, Andre / Nguyen, Hoai Viet / Gruschka, Nils / Lo Iacono, Luigi et al. | 2021
- 23
-
TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised LearningLee, Sangyup / Tariq, Shahroz / Kim, Junyaup / Woo, Simon S. et al. | 2021
- 24
-
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and EnsemblesBartoszewski, Filip Wieslaw / Just, Mike / Lones, Michael A. / Mandrychenko, Oleksii et al. | 2021
- 25
-
Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error PatternsKim, Young Geun / Yun, Jeong-Han / Han, Siho / Kim, Hyoung Chun / Woo, Simon S. et al. | 2021
- 26
-
What Is Lurking in Your Backups?Lenard, Ben / Rasin, Alexander / Scope, Nick / Wagner, James et al. | 2021
- 27
-
How Do Users Chain Email Accounts Together?Kraus, Lydia / S̆vidron̆ová, Mária / Stobert, Elizabeth et al. | 2021
- 28
-
Tensions that Hinder the Implementation of Digital Security GovernanceSchinagl, Stef / Khapova, Svetlana / Shahim, Abbas et al. | 2021