Implementation and Attacks Analysis of a Honeypot. Abbas, C. J. B., García-Villalba, L. J., & López, V. L. In Gervasi, O. & Gavrilova, M. L., editors, Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, volume 4706, of Lecture Notes in Computer Science, pages 489–502, 2007. Springer. Paper doi bibtex @inproceedings{DBLP:conf/iccsa/AbbasGL07,
author = {Cl{\'{a}}udia J. Barenco Abbas and
L. Javier Garc{\'{\i}}a{-}Villalba and
Victoria L{\'{o}}pez L{\'{o}}pez},
editor = {Osvaldo Gervasi and
Marina L. Gavrilova},
title = {Implementation and Attacks Analysis of a Honeypot},
booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International
Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings,
Part {II}},
series = {Lecture Notes in Computer Science},
volume = {4706},
pages = {489--502},
publisher = {Springer},
year = {2007},
url = {https://doi.org/10.1007/978-3-540-74477-1\_46},
doi = {10.1007/978-3-540-74477-1\_46},
timestamp = {Tue, 14 May 2019 10:00:43 +0200},
biburl = {https://dblp.org/rec/conf/iccsa/AbbasGL07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"4ZeAZdQSHnjFjiohc","bibbaseid":"abbas-garcavillalba-lpez-implementationandattacksanalysisofahoneypot-2007","author_short":["Abbas, C. J. B.","García-Villalba, L. J.","López, V. L."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Cláudia","J.","Barenco"],"propositions":[],"lastnames":["Abbas"],"suffixes":[]},{"firstnames":["L.","Javier"],"propositions":[],"lastnames":["García-Villalba"],"suffixes":[]},{"firstnames":["Victoria","López"],"propositions":[],"lastnames":["López"],"suffixes":[]}],"editor":[{"firstnames":["Osvaldo"],"propositions":[],"lastnames":["Gervasi"],"suffixes":[]},{"firstnames":["Marina","L."],"propositions":[],"lastnames":["Gavrilova"],"suffixes":[]}],"title":"Implementation and Attacks Analysis of a Honeypot","booktitle":"Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II","series":"Lecture Notes in Computer Science","volume":"4706","pages":"489–502","publisher":"Springer","year":"2007","url":"https://doi.org/10.1007/978-3-540-74477-1\\_46","doi":"10.1007/978-3-540-74477-1_46","timestamp":"Tue, 14 May 2019 10:00:43 +0200","biburl":"https://dblp.org/rec/conf/iccsa/AbbasGL07.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/iccsa/AbbasGL07,\n author = {Cl{\\'{a}}udia J. Barenco Abbas and\n L. Javier Garc{\\'{\\i}}a{-}Villalba and\n Victoria L{\\'{o}}pez L{\\'{o}}pez},\n editor = {Osvaldo Gervasi and\n Marina L. Gavrilova},\n title = {Implementation and Attacks Analysis of a Honeypot},\n booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International\n Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings,\n Part {II}},\n series = {Lecture Notes in Computer Science},\n volume = {4706},\n pages = {489--502},\n publisher = {Springer},\n year = {2007},\n url = {https://doi.org/10.1007/978-3-540-74477-1\\_46},\n doi = {10.1007/978-3-540-74477-1\\_46},\n timestamp = {Tue, 14 May 2019 10:00:43 +0200},\n biburl = {https://dblp.org/rec/conf/iccsa/AbbasGL07.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Abbas, C. J. B.","García-Villalba, L. J.","López, V. L."],"editor_short":["Gervasi, O.","Gavrilova, M. L."],"key":"DBLP:conf/iccsa/AbbasGL07","id":"DBLP:conf/iccsa/AbbasGL07","bibbaseid":"abbas-garcavillalba-lpez-implementationandattacksanalysisofahoneypot-2007","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-540-74477-1\\_46"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/g/LJavierGarciaVillalba.bib","dataSources":["7WMLLoWg42ZD5AMFf"],"keywords":[],"search_terms":["implementation","attacks","analysis","honeypot","abbas","garcía-villalba","lópez"],"title":"Implementation and Attacks Analysis of a Honeypot","year":2007}