A Pointillist Approach for Comparing Honeypots. Pouget, F. & Holz, T. In Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings, pages 51--68, 2005. Paper doi bibtex @inproceedings{DBLP:conf/dimva/PougetH05,
author = {Fabien Pouget and
Thorsten Holz},
title = {A Pointillist Approach for Comparing Honeypots},
booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment,
Second International Conference, {DIMVA} 2005, Vienna, Austria, July
7-8, 2005, Proceedings},
pages = {51--68},
year = {2005},
crossref = {DBLP:conf/dimva/2005},
url = {https://doi.org/10.1007/11506881_4},
doi = {10.1007/11506881_4},
timestamp = {Tue, 30 May 2017 16:36:53 +0200},
biburl = {http://dblp.org/rec/bib/conf/dimva/PougetH05},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
Downloads: 0
{"_id":"k4pppoRhREQbQarc6","bibbaseid":"pouget-holz-apointillistapproachforcomparinghoneypots-2005","downloads":0,"creationDate":"2017-09-27T10:54:12.995Z","title":"A Pointillist Approach for Comparing Honeypots","author_short":["Pouget, F.","Holz, T."],"year":2005,"bibtype":"inproceedings","biburl":"http://dblp.org/pers/tb2/h/Holz:Thorsten","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Fabien"],"propositions":[],"lastnames":["Pouget"],"suffixes":[]},{"firstnames":["Thorsten"],"propositions":[],"lastnames":["Holz"],"suffixes":[]}],"title":"A Pointillist Approach for Comparing Honeypots","booktitle":"Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings","pages":"51--68","year":"2005","crossref":"DBLP:conf/dimva/2005","url":"https://doi.org/10.1007/11506881_4","doi":"10.1007/11506881_4","timestamp":"Tue, 30 May 2017 16:36:53 +0200","biburl":"http://dblp.org/rec/bib/conf/dimva/PougetH05","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@inproceedings{DBLP:conf/dimva/PougetH05,\n author = {Fabien Pouget and\n Thorsten Holz},\n title = {A Pointillist Approach for Comparing Honeypots},\n booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment,\n Second International Conference, {DIMVA} 2005, Vienna, Austria, July\n 7-8, 2005, Proceedings},\n pages = {51--68},\n year = {2005},\n crossref = {DBLP:conf/dimva/2005},\n url = {https://doi.org/10.1007/11506881_4},\n doi = {10.1007/11506881_4},\n timestamp = {Tue, 30 May 2017 16:36:53 +0200},\n biburl = {http://dblp.org/rec/bib/conf/dimva/PougetH05},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n","author_short":["Pouget, F.","Holz, T."],"key":"DBLP:conf/dimva/PougetH05","id":"DBLP:conf/dimva/PougetH05","bibbaseid":"pouget-holz-apointillistapproachforcomparinghoneypots-2005","role":"author","urls":{"Paper":"https://doi.org/10.1007/11506881_4"},"downloads":0},"search_terms":["pointillist","approach","comparing","honeypots","pouget","holz"],"keywords":[],"authorIDs":[],"dataSources":["nsffQ5pYkGG38Yzs3"]}