Title&col=t">↑&col=t">↓Author&col=a">↑&col=a">↓Type&col=pt">↑&col=pt">↓Year&col=y">↑&col=y">↓LangSize&col=s">↑&col=s">↓linkCommentSourceUpload&col=u">↑&col=u">↓Tags
Collecting Autonomous Spreading Malware Using High-Interaction HoneypotsJianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zoupdf2008en649.17 Khoneybow-ICICS07.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Malware Virus Trojan honeyblog Honeypot
Eine Infrastruktur zur Einschätzung des aktuellen Gefährdungslevels durch MalwareLaura Anna Itzelpdf2007de2.06 MBdiplomarbeit-2007-itzel.p...ound on http://honeyblog.orghttp://pi1.informatik.uni-mannhe...2009-06-21Security Malware Virus Trojan honeyblog Honeypot Diplomarbeit
Monkey-Spider: Detecting Malicious Websites with Low-Interaction HoneyclientsAli Ikinci, Thorsten Holz, Felix Freilingpdf2007en183.18 Kmonkey-spider-Sicherheit0...found on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Internet Malware honeyblog Honeypot