Dynamic Distributed Honeypot Based on Blockchain
暂无分享,去创建一个
Honglong Chen | Leyi Shi | Yang Li | Baoying Shan | Tianxu Liu | Jia Liu | Honglong Chen | Yang Li | Leyi Shi | Tianxu Liu | Baoying Shan | Jia Liu
[1] Liu Xin,et al. Game Theoretic Analysis for the Feature of Mimicry Honeypot , 2013 .
[2] Brian Hay,et al. Automated Honeynet Deployment for Dynamic Network Environment , 2013, 2013 46th Hawaii International Conference on System Sciences.
[3] Feng Xia,et al. On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks , 2018, IEEE Transactions on Emerging Topics in Computing.
[4] Jiguo Yu,et al. RMTS: A robust clock synchronization scheme for wireless sensor networks , 2019, J. Netw. Comput. Appl..
[5] Zhili Sun,et al. Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.
[6] Jia Chun-fu. Research on dynamic array honeypot for collaborative network defense strategy , 2012 .
[7] Chun-fu Jia,et al. A Game Theoretic Analysis for the Honeypot Deceptive Mechanism: A Game Theoretic Analysis for the Honeypot Deceptive Mechanism , 2012 .
[8] Jong Hyuk Park,et al. DistArch-SCNet: Blockchain-Based Distributed Architecture with Li-Fi Communication for a Scalable Smart City Network , 2018, IEEE Consumer Electronics Magazine.
[9] Chris Moore,et al. Detecting Ransomware with Honeypot Techniques , 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC).
[10] Sachin Shetty,et al. Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).
[11] Ralph Deters,et al. Performance analysis of ethereum transactions in private blockchain , 2017, 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS).
[12] David Fernández,et al. Versatile virtual honeynet management framework , 2017, IET Inf. Secur..
[13] Feng Xia,et al. Probabilistic Detection of Missing Tags for Anonymous Multicategory RFID Systems , 2017, IEEE Transactions on Vehicular Technology.
[14] Yan Zhang,et al. Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains , 2017, IEEE Transactions on Industrial Informatics.
[15] Ramesh Chandra Joshi,et al. An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks , 2009, Comput. Commun..
[16] Daniel Jackson,et al. Software Abstractions - Logic, Language, and Analysis , 2006 .
[17] Honglong Chen,et al. A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs , 2016, IEEE Transactions on Vehicular Technology.
[18] Rizal Broer Bahaweres,et al. Implementation of a modern security systems honeypot Honey Network on wireless networks , 2017, 2017 International Young Engineers Forum (YEF-ECE).
[19] H. Artail,et al. A Dynamic Honeypot Design for Intrusion Detection , 2004, The IEEE/ACS International Conference on Pervasive Services.
[20] Stefano Russo,et al. Trust Management in Fog/Edge Computing by Means of Blockchain Technologies , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[21] Hans D. Schotten,et al. An adaptive honeypot configuration, deployment and maintenance strategy , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[22] Khashayar Kotobi,et al. Secure Blockchains for Dynamic Spectrum Access: A Decentralized Database in Moving Cognitive Radio Networks Enhances Security and User Access , 2018, IEEE Vehicular Technology Magazine.
[23] Feng Xia,et al. Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems , 2018, IEEE Internet of Things Journal.
[24] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[25] Ville Leppänen,et al. A Survey on Anti-honeypot and Anti-introspection Methods , 2017, WorldCIST.
[26] Jiguo Yu,et al. MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems , 2018, IEEE Transactions on Vehicular Technology.
[27] Zhihui Du,et al. Adaptive and Flexible Virtual Honeynet , 2015, MSPN.
[28] Tomas Kulik,et al. A Framework for Threat-Driven Cyber Security Verification of IoT Systems , 2018, 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW).
[29] Saeedi Alireza,et al. A Dynamic Approach for Honeypot Management , 2012 .
[30] Srinivas Devadas,et al. Catena: Efficient Non-equivocation via Bitcoin , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[31] Anirban Basu,et al. On blockchain-based anonymized dataset distribution platform , 2017, 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA).
[32] Daniel Jeswin Nallathambi,et al. Use of honeypots for mitigating DoS attacks targeted on IoT networks , 2017, 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP).
[33] Saurabh Chamotra,et al. Honeypot Deployment in Broadband Networks , 2016, ICISS.
[34] Hairong Qi,et al. Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server , 2019, IEEE Transactions on Mobile Computing.
[35] Hassan Artail,et al. A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks , 2006, Comput. Secur..
[36] Xiuzhen Cheng,et al. A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications , 2018, IEEE Access.
[37] Eric Filiol,et al. On blockchain security and relevant attacks , 2018, 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM).
[38] Yang Li,et al. Performance Analysis of Honeypot with Petri Nets , 2018, Inf..
[39] Honglong Chen,et al. Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags , 2017, IEEE Internet of Things Journal.
[40] Maged Hamada Ibrahim. SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem , 2017, Int. J. Netw. Secur..
[41] Younès El Bouzekri El Idrissi,et al. A security approach for social networks based on honeypots , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).
[42] Ki-Hyung Kim,et al. Dynamic Access Control Scheme for IoT Devices using Blockchain , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).
[43] Max Mühlhäuser,et al. Multi-stage attack detection and signature generation with ICS honeypots , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.