Skip to search formSkip to main contentSkip to account menu

Honeytoken

In the field of computer security, honeytokens are honeypots that are not computer systems. Their value lies not in their use, but in their abuse. As… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Ramsonware is a malware of its kind and is growing rapidly. There is an urgency to take this matter seriously. Honeypot which… 
2017
2017
A web user who falsely accesses a compromised website is usually redirected to an adversary’s website and is forced to download… 
2017
2017
Insider threat is one of the major concerns for an organization that breaches the confidentiality and integrity of enterprise… 
Review
2016
Review
2016
Intrusion detection system using honeypot being increasingly used technique for intrusion detection and recovery of data… 
2014
2014
  • Julian L. Rrushi
  • 2014
  • Corpus ID: 18462561
Law enforcement employs an investigative approach based on marked money bills to track illegal drug dealers. In this paper we… 
2013
2013
A user who accesses a compromised website is usually redirected to an adversary's website and forced to download malware… 
2008
2008
La presente invention concerne de fausses donnees « honeytoken » qui sont generees, stockees et diffusees a une organisation… 
2007
2007
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies… 
2006
2006
Data and information are sometimes called the “crown jewels” of an organization [3]. Modern company cannot exist without flexible… 
2003
2003
Many different terms, definitions and classifications for honeypots, honeynets and other honeytokens have been proposed by…