Honeytoken

In the field of computer security, honeytokens are honeypots that are not computer systems. Their value lies not in their use, but in their abuse. As… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2003-2017
01220032017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A web user who falsely accesses a compromised website is usually redirected to an adversary’s website and is forced to download… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2016
Review
2016
Intrusion detection system using honeypot being increasingly used technique for intrusion detection and recovery of data… (More)
  • figure 3
  • figure 2
  • figure 4
  • figure 3
  • table I
Is this relevant?
2015
2015
Web applications are one of the mostly attacked platforms today, and because of that new ways to break into the web applications… (More)
  • figure 1
Is this relevant?
2011
2011
Honeytokens are artificial digital data items planted deliberately into a genuine system resource in order to detect unauthorized… (More)
  • figure 2
  • figure 3
  • table 1
Is this relevant?
2007
2007
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies… (More)
  • figure 1
  • figure 2
Is this relevant?
2007
2007
Worms are a significant threat to network systems, both through resource consumption and malicious activity. This paper examines… (More)
  • table III
  • table I
Is this relevant?
Review
2004
Review
2004
In this paper, we show that simple, cheap and easily deployable honeypots can help understanding of the attack processes that… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2003
2003
Many different terms, definitions and classifications for honeypots, honeynets and other honeytokens have been proposed by… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?