Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,985,480 papers from all fields of science
Search
Sign In
Create Free Account
Client honeypot
Known as:
Client honeypot / honeyclient
, Honeyclient
Honeypots are security devices whose value lie in being probed and compromised. Traditional honeypots are servers (or devices that expose server…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Broader (1)
Computer security
Honeypot (computing)
Niels Provos
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
On the Effectiveness of the National Do-Not-Call Registries
Merve Sahin
,
Aurélien Francillon
,
S. Antipolis
2018
Corpus ID: 44115296
Voice spam is a significant problem worldwide. In this paper, we observe some aspects of the voice spam ecosystem in Europe using…
Expand
2012
2012
Scalable and Performance-Efficient Client Honeypot on High Interaction System
Mitsuaki Akiyama
,
Yuhei Kawakoya
,
Takeo Hariu
IEEE/IPSJ 12th International Symposium on…
2012
Corpus ID: 14028726
We investigated client honeypots for detecting and circumstantially analyzing drive-by download attacks. A client honeypot…
Expand
2011
2011
Using asymmetric keys in a certified trust model for multiagent systems
V. Botelho
,
F. Enembreck
,
B. C. Ávila
,
Hilton José Silva de Azevedo
,
E. Scalabrin
Expert systems with applications
2011
Corpus ID: 33478659
2010
2010
Client honeypots: Approaches and challenges
Mahmoud T. Qassrawi
,
Hongli Zhang
International Conference on New Trends in…
2010
Corpus ID: 17696051
In recent years, client user has become the main target for attacks, as the adversary believe that the end user is the weakest…
Expand
Highly Cited
2010
Highly Cited
2010
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks
Mitsuaki Akiyama
,
Makoto Iwamura
,
Yuhei Kawakoya
,
Kazufumi Aoki
,
M. Itoh
IEICE transactions on communications
2010
Corpus ID: 25230455
Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser…
Expand
2007
2007
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
Liran Ma
,
Amin Y. Teymorian
,
Xiuzhen Cheng
IEEE GLOBECOM - IEEE Global Telecommunications…
2007
Corpus ID: 5723556
We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve…
Expand
Review
2005
Review
2005
Comparative survey of local honeypot sensors to assist network forensics
Pei-Te Chen
,
C. Laih
,
F. Pouget
,
M. Dacier
IEEE International Workshop on Systematic…
2005
Corpus ID: 312822
This paper intends to illustrate the usefulness of deploying multiple simple honeypot sensors in a large variety of locations…
Expand
2004
2004
The Honeywall CD-ROM
George Chamales
IEEE Security and Privacy
2004
Corpus ID: 17057548
The Honeynet Project is a non-profit research organization of security professionals dedicated to information security on the…
Expand
2004
2004
How Trade Credit Differs from Loans: Evidence from Japanese Trading Companies
Iichiro Uesugi
,
Guy M. Yamashiro
2004
Corpus ID: 15756980
In this paper we examine the determinants of the relationship between trade credit and bank loans. Previous studies of this…
Expand
1997
1997
Number 1 Spring 1995 65 INDIVIDUAL ASSET ALLOCATION AND INDICATORS OF PERCEIVED CLIENT RISK TOLERANCE
N. Riley
,
M. G. Russon
1997
Corpus ID: 12571727
Proper asset allocation is dependent upon two inputs: (1) expected capital market returns and (2) the individual client’s desire…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE