[HTML][HTML] H-DOCTOR: Honeypot based firewall tuning for attack prevention
MR Amal, P Venkadesh - Measurement: Sensors, 2023 - Elsevier
A honeypot is a well-known entrapment technique used by network and Internet of Things
(IoT) security professionals to lure intruders. Unlike traditional security measures, they can …
(IoT) security professionals to lure intruders. Unlike traditional security measures, they can …
[PDF][PDF] Measurement: Sensors
MR Amal, P Venkadesh - Measurement, 2023 - researchgate.net
ABSTRACT A honeypot is a well-known entrapment technique used by network and Internet
of Things (IoT) security professionals to lure intruders. Unlike traditional security measures …
of Things (IoT) security professionals to lure intruders. Unlike traditional security measures …
Hybrid H-DOC: A bait for analyzing cyber attacker behavior
MR Amal, P Venkadesh - International journal of electrical and …, 2023 - hrcak.srce.hr
Sažetak Cyber security is a vital concern for companies with internet-based cloud networks.
These networks are constantly vulnerable to attack, whether from inside or outside …
These networks are constantly vulnerable to attack, whether from inside or outside …
RPL Attacks Detection and Prevention in IOT Networks with Advanced GRU Deep Learning Algorithm
T Thiyagu, S Krishnaveni - 2022 Smart Technologies …, 2022 - ieeexplore.ieee.org
Cyber-attacks on the Internet of Things have improved significantly more in previous years,
with the expansion of intelligent internet-connected systems and functions. The Internet of …
with the expansion of intelligent internet-connected systems and functions. The Internet of …
NexGuard: Industrial Cyber-Physical System Défense Using Ensemble Feature Selection and Explainable Deep Learning Techniques
In recent years, industrial cyber-physical systems (ICPS) have advanced rapidly, resulting in
sophisticated and intelligent networks of industrial devices and systems. These networks …
sophisticated and intelligent networks of industrial devices and systems. These networks …
Mimic Honeypot Design and Analysis
J Guo, H Yuan, M Xu, X Yang - 2022 2nd International …, 2022 - ieeexplore.ieee.org
Aiming at the problem that high-interaction honeypots face great risks. This paper integrates
honeypot technology and mimic defense technology, proposes a honeypot model based on …
honeypot technology and mimic defense technology, proposes a honeypot model based on …
Introduction to Cyber Tensions Preventative Analysis and Honeypotting Strategy
T Osmëni, M Ali - 2022 International Conference on Computing …, 2022 - ieeexplore.ieee.org
A cyberforce tasked to counteract cyberthreats must be constantly adapting to the threat
level and technologies. This requires constant research, updating of knowledge and training …
level and technologies. This requires constant research, updating of knowledge and training …
Tracing Phishing Website Original IP Address
KG Babu, J Naveen, PVVD Reddy… - … on Networking and …, 2023 - ieeexplore.ieee.org
security is of utmost significance as every device is connected to the internet. can fluently
steal our credentials and misuse our secret data similar as watchwords, date of birth, etc. To …
steal our credentials and misuse our secret data similar as watchwords, date of birth, etc. To …