Information precautions using intellectual honeypot instrument Journal title: Scientific Journal of Pure and Applied Sciences Authors: L.S. Arul*| Director-CA, T.John College, Bangalore, India., K. Lecturer| T.John College, Bangalore,... Subject(s): Biological Sciences, Chemistry, Computer and Information Science, Engineering, Mathematics, Agricultural Science
Botnets: Lifecycle, Attacks, Detection and Prevention Journal title: International Journal of Marketing and Technology Authors: Ms. Mriga Gupta Subject(s): Computer and Information Science, Economics, Banks and Banking, Organizational Science
An Approach for Intrusion Detection using HoneyPots to Improve Network Security Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Mohd Junedul Haque Subject(s): Engineering, Applied Linguistics
Defending Polymorphic Worms in Computer Network using Honeypot Journal title: International Journal of Advanced Computer Science & Applications Authors: R. Goswamia Subject(s):
Implementation of a Secured system with Roaming Server and Roaming Ports Journal title: International Journal on Computer Science and Engineering Authors: R. Bharathi , Prof. Dr. R. Sukanesh Subject(s):
Detection of threats in Honeynet using Honeywall Journal title: International Journal on Computer Science and Engineering Authors: Navita Sharma , Sukhwinder Singh Sran Subject(s):
A survey on the approaches in honeypot for implementing network security Journal title: International Journal on Computer Science and Engineering Authors: Niharika Srivastava , Ved Prakash Subject(s):
Honeypot based Secure Network System Journal title: International Journal on Computer Science and Engineering Authors: Yogendra Kumar Jain , Surabhi Singh Subject(s):
SSH Honeypot: Building, Deploying and Analysis Journal title: International Journal of Advanced Computer Science & Applications Authors: Harry Doubleday, Leandros Maglaras, Helge Janicke Subject(s):
SECURING WMN USING HONEYPOT TECHNIQUE Journal title: International Journal on Computer Science and Engineering Authors: Priyanka Gupta , Paramjeet Rawat , Suraj Malik , Sudhanshu Gupta Subject(s):
Using traps to protect network infrastructure from intruders’ attacks Journal title: Вісник НТУУ КПІ. Серія Радіотехніка, Радіоапаратобудування Authors: O. Lavrivska, Yu. Grycyuk Subject(s):
„Cicha reakcja” na zdalne ataki teleinformatyczne Journal title: Przegląd Teleinformatyczny Authors: Adam PATKOWSKI Subject(s):
Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques