Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.173
1.
  • Evaluation and Comparison o... Evaluation and Comparison of the Use of Reinforcement Learning Algorithms on SSH Honeypot
    Kristyanto, Marco Ariano; Louk, Maya Hilda Lestari Teknika (Institut Informatika Indonesia) (Online), 02/2024, Letnik: 13, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    A honeypot is a tool or system used to record, redirect, and even lure hackers into penetrating and exploiting a system. The increasing development of technology causes cyber hackers to realize the ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
2.
Celotno besedilo
Dostopno za: UL
3.
  • An SDN-Enabled Pseudo-Honey... An SDN-Enabled Pseudo-Honeypot Strategy for Distributed Denial of Service Attacks in Industrial Internet of Things
    Du, Miao; Wang, Kun IEEE transactions on industrial informatics, 2020-Jan., 2020-1-00, 20200101, Letnik: 16, Številka: 1
    Journal Article

    Leveraging high-performance software-defined networks (SDNs) to manage industrial Internet of Things (IIoT) devices has become a promising trend; the SDN is expected to be the next generation as a ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
4.
  • Kecerdasan Buatan untuk Sec... Kecerdasan Buatan untuk Security Orchestration, Automation and Response: Tinjauan Cakupan
    Venny Gustina DM; Ananda Ananda Jurnal komputer terapan, 06/2024, Letnik: 10, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Integrasi kecerdasan buatan (AI) dalam Security Orchestration, Automation, and Response (SOAR) menjanjikan revolusi dalam operasi keamanan siber. Adopsi teknologi SOAR yang didukung AI dapat membantu ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
5.
  • HIoTPOT: Surveillance on Io... HIoTPOT: Surveillance on IoT Devices against Recent Threats
    Gandhi, Usha Devi; Kumar, Priyan Malarvizhi; Varatharajan, R. ... Wireless personal communications, 11/2018, Letnik: 103, Številka: 2
    Journal Article
    Recenzirano

    Honeypot Internet of Things (IoT) (HIoTPOT) keep a secret eye on IoT devices and analyzes the various recent threats which are dangerous to IoT devices. In this paper, implementation of a research ...
Celotno besedilo
Dostopno za: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
6.
  • A Comparison of an Adaptive... A Comparison of an Adaptive Self-Guarded Honeypot with Conventional Honeypots
    Touch, Sereysethy; Colin, Jean-Noël Applied Sciences, 05/2022, Letnik: 12, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    To proactively defend computer systems against cyber-attacks, a honeypot system—purposely designed to be prone to attacks—is commonly used to detect attacks, discover new vulnerabilities, exploits or ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
7.
  • Gotta Catch ’em All: A Mult... Gotta Catch ’em All: A Multistage Framework for Honeypot Fingerprinting
    Srinivasa, Shreyas; Pedersen, Jens Myrup; Vasilomanolakis, Emmanouil Digital threats (Print), 10/2023, Letnik: 4, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Honeypots are decoy systems that lure attackers by presenting them with a seemingly vulnerable system. They provide an early detection mechanism as well as a method for learning how adversaries work ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
8.
  • A survey of contemporary op... A survey of contemporary open-source honeypots, frameworks, and tools
    Ilg, Niclas; Duplys, Paul; Sisejkovic, Dominik ... Journal of network and computer applications, November 2023, 2023-11-00, Letnik: 220
    Journal Article
    Recenzirano

    Automated attacks allow adversaries to exploit vulnerabilities in enterprise IT systems at short notice. To identify such attacks as well as new cybersecurity threats, defenders use honeypot systems; ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
9.
  • A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems
    Franco, Javier; Aris, Ahmet; Canberk, Berk ... IEEE Communications surveys and tutorials, 01/2021, Letnik: 23, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) have become essential for our daily lives in contexts such as our homes, buildings, cities, ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
10.
  • HoneyJudge: A PLC Honeypot ... HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory Testing
    Zhu, Hengye; Liu, Mengxiang; Chen, Binbin ... IEEE transactions on information forensics and security, 2024, Letnik: 19
    Journal Article
    Recenzirano

    The widespread use of programmable logic controllers (PLCs) in critical infrastructures has given rise to escalating cybersecurity concerns regarding PLC attacks. As a proactive defense mechanism, ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
1 2 3 4 5
zadetkov: 1.173

Nalaganje filtrov