Results (2)
Search Parameters:
Keyword: HoneypotsA security approach based on honeypots: Protecting Online Social network from malicious profiles
Advances in Science, Technology and Engineering Systems Journal,
Volume 2,
Issue 3,
Page # 198–204,
2017;
DOI: 10.25046/aj020326
Abstract:
In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for…
Read More(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Towards Deployment Strategies for Deception Systems
Advances in Science, Technology and Engineering Systems Journal,
Volume 2,
Issue 3,
Page # 1272–1279,
2017;
DOI: 10.25046/aj0203161
Abstract:
Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…
Read More(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
