Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cyber threat intelligence from honeypot data using elasticsearch
H Almohannadi, I Awan, J Al Hamar… - 2018 IEEE 32nd …, 2018 - ieeexplore.ieee.org
Cyber attacks are increasing in every aspect of daily life. There are a number of different
technologies around to tackle cyber-attacks, such as Intrusion Detection Systems (IDS) …
technologies around to tackle cyber-attacks, such as Intrusion Detection Systems (IDS) …
Picky attackers: Quantifying the role of system properties on intruder behavior
Honeypots constitute an invaluable piece of technology that allows researchers and security
practitioners to track the evolution of break-in techniques by attackers and discover new …
practitioners to track the evolution of break-in techniques by attackers and discover new …
Security for smart mobile networks: The NEMESYS approach
The growing popularity of smart mobile devices such as smartphones and tablets has made
them an attractive target for cyber-criminals, resulting in a rapidly growing and evolving …
them an attractive target for cyber-criminals, resulting in a rapidly growing and evolving …
Click this, not that: extending web authentication with deception
With phishing attacks, password breaches, and brute-force login attacks presenting constant
threats, it is clear that passwords alone are inadequate for protecting the web applications …
threats, it is clear that passwords alone are inadequate for protecting the web applications …
NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem
As a consequence of the growing popularity of smart mobile devices, mobile malware is
clearly on the rise, with attackers targeting valuable user information and exploiting …
clearly on the rise, with attackers targeting valuable user information and exploiting …
Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence
H Al-Mohannadi, I Awan, J Al Hamar - Service Oriented Computing and …, 2020 - Springer
The understanding of cyber threats to a network is challenging yet rewarding as it allows an
organisation to prevent a potential attack. Numerous efforts have been made to predict cyber …
organisation to prevent a potential attack. Numerous efforts have been made to predict cyber …
Assessment of honeypots: Issues, challenges and future directions
BB Gupta, A Gupta - International Journal of Cloud Applications and …, 2018 - igi-global.com
Honeypots act as an easy target for attackers but it is actually a “decoy” in which attacker is
trapped. It is a defensive technique which lures the attacker into performing some illicit …
trapped. It is a defensive technique which lures the attacker into performing some illicit …
[PDF][PDF] Cellpot: A concept for next generation cellular network honeypots
Smartphones have been shown to be vulnerable. Similarly, cellular networks have been
shown to be vulnerable to denial of service attacks through signaling. Attackers can use …
shown to be vulnerable to denial of service attacks through signaling. Attackers can use …
This network is infected: Hostage-a low-interaction honeypot for mobile devices
In recent years, the number of sophisticated cyber attacks has increased rapidly. At the same
time, people tend to utilize unknown, in terms of trustworthiness, wireless networks in their …
time, people tend to utilize unknown, in terms of trustworthiness, wireless networks in their …
[HTML][HTML] Designing a smartphone honeypot system using performance counters
This paper presents a design for a honeypot smartphone system. The smartphone honeypot
system has to perform several complex functions, the basic important three functions are …
system has to perform several complex functions, the basic important three functions are …