Title&col=t">↑&col=t">↓Author&col=a">↑&col=a">↓Type&col=pt">↑&col=pt">↓Year&col=y">↑&col=y">↓LangSize&col=s">↑&col=s">↓linkCommentSourceUpload&col=u">↑&col=u">↓Tags
An Inquiry into the Nature and Causes of the Wealth of Internet MiscreantsJason Franklin, Adrian Perrig, Vern Paxson, Stefan Savagepdf2007en348.12 Kmiscreant-wealth.ccs07.pd...found on http://honeyblog.orghttp://www.icir.org/vern/papers/...2009-06-21Security Internet Underground Measurement Markets E-crime
Know Your Enemy: Malicious Web ServersThe Honeynet Project - Christian Seifert, Ramon Steenson, Thorsten Holz, Bing Yuan, Michael A. Davispdf2007en1.07 MBKYE-Malicious_Web_Servers...found on http://honeynet.orghttp://honeynet.org/papers/mws/K...2009-06-21Security Internet Malware Honeynet Webserver
Know Your Enemy: Fast-Flux Service NetworksThe Honeynet Project & Research Alliancepdf2007en479.52 Kfast-flux.pdffound on http://honeynet.orghttp://honeynet.org/papers/ff/fa...2009-06-21Security network Internet fast-flux Malware E-crime
Monkey-Spider: Detecting Malicious Websites with Low-Interaction HoneyclientsAli Ikinci, Thorsten Holz, Felix Freilingpdf2007en183.18 Kmonkey-spider-Sicherheit0...found on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Internet Malware honeyblog Honeypot