Recent posts

TypePostAuthorRepliesLast updated
Book pageIN-DEPTH ANALYSIS jamie.riden08 years 16 weeks ago
Book pageDEFENSE EVALUATION jamie.riden08 years 16 weeks ago
Book pageIDENTIFICATION OF MALICIOUS WEB SERVERS jamie.riden08 years 16 weeks ago
Book pageINTRODUCTION jamie.riden08 years 16 weeks ago
Book pageIntroduction drupal08 years 16 weeks ago
Imagefigure18 jamie.riden08 years 16 weeks ago
Book pageSERVER HONEYPOTS VS. CLIENT HONEYPOTS jamie.riden08 years 16 weeks ago
Imagefigure19 jamie.riden08 years 16 weeks ago
Book pageACKNOWLEDGEMENTS jamie.riden08 years 16 weeks ago
Book pageFUTURE WORK jamie.riden08 years 16 weeks ago
Imagefigure17 jamie.riden08 years 16 weeks ago
Imagefigure16 jamie.riden08 years 16 weeks ago
Imagefigure8 jamie.riden08 years 16 weeks ago
Imagefigure7 jamie.riden08 years 16 weeks ago
Imagefigure6 jamie.riden08 years 16 weeks ago
Imagefigure5 jamie.riden08 years 16 weeks ago
Imagefigure4 jamie.riden08 years 16 weeks ago
Imageinput-urls-by-cat jamie.riden08 years 16 weeks ago
Book pageCLIENT-SIDE ATTACKS jamie.riden08 years 16 weeks ago
Imageclient honeypot jamie.riden08 years 16 weeks ago
Imageserver honeypot jamie.riden08 years 16 weeks ago
Book pageINTRODUCTION jamie.riden08 years 16 weeks ago
Book pageAPPENDIX E: Fast-Flux Proxy Samples jamie.riden08 years 16 weeks ago
Book pageAPPENDIX D: Fast-Flux Proxy Samples jamie.riden08 years 16 weeks ago
Book pageAPPENDIX C: Fast-Flux Proxy Samples jamie.riden08 years 16 weeks ago