Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1603.07433
Cited By
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study
24 March 2016
Zhenxin Zhan
Maochao Xu
Shouhuai Xu
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study"
21 / 21 papers shown
Title
HoneyGPT: Breaking the Trilemma in Terminal Honeypots with Large Language Model
Ziyang Wang
Jianzhou You
Haining Wang
Tianwei Yuan
Shichao Lv
Yang Wang
Limin Sun
113
2
0
04 Jun 2024
Attacker Profiling Through Analysis of Attack Patterns in Geographically Distributed Honeypots
Veronica Valeros
M. Rigaki
Sebastian Garcia
22
2
0
02 May 2023
ProAPT: Projection of APT Threats with Deep Reinforcement Learning
M. Dehghan
B. Sadeghiyan
E. Khosravian
Alireza Sedighi Moghaddam
Farshid Nooshi
28
4
0
15 Sep 2022
Modeling Multivariate Cyber Risks: Deep Learning Dating Extreme Value Theory
Mingyue Zhang Wu
Jinzhu Luo
Xing Fang
Maochao Xu
Peng Zhao
47
12
0
15 Mar 2021
Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites
Mir Mehedi Ahsan Pritom
Kristin M. Schweitzer
Raymond M. Bateman
Min Xu
Shouhuai Xu
76
11
0
25 Feb 2021
Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity
Shouhuai Xu
57
49
0
09 Oct 2020
Change Point Models for Real-time Cyber Attack Detection in Connected Vehicle Environment
G. Comert
Mizanur Rahman
Mhafuzul Islam
M. Chowdhury
39
17
0
05 Mar 2020
A Case Study on Using Deep Learning for Network Intrusion Detection
Gabriel C. Fernandez
Shouhuai Xu
37
37
0
05 Oct 2019
Attacker Behaviour Profiling using Stochastic Ensemble of Hidden Markov Models
Soham Deshmukh
Rahul Rade
F. Kazi
AAML
18
9
0
28 May 2019
Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates
Mehdi Zakroum
Abdellah Houmz
Mounir Ghogho
Ghita Mezzour
Abdelkader Lahmadi
J. François
M. Elkoutbi
27
9
0
23 Dec 2018
Change Point Models for Real-time V2I Cyber Attack Detection in a Connected Vehicle Environment
G. Comert
Mizanur Rahman
Mhafuzul Islam
M. Chowdhury
50
2
0
30 Nov 2018
Demystifying Deception Technology:A Survey
Daniel Fraunholz
S. D. Antón
Christoph Lipps
Daniel Reti
Daniel Krohmer
Frederic Pohl
Matthias Tammen
Hans D. Schotten
50
64
0
17 Apr 2018
Malware in the Future? Forecasting of Analyst Detection of Cyber Events
J. Bakdash
Steve E. Hutchinson
Erin G. Zaroukian
L. Marusich
Saravanan Thirumuruganathan
C. Sample
Blaine Hoffman
Gautam Das
82
37
0
11 Jul 2017
Spatiotemporal patterns and predictability of cyberattacks
Yu-Zhong Chen
Zi-Gang Huang
Shouhuai Xu
Y. Lai
51
92
0
24 Mar 2016
A Characterization of Cybersecurity Posture from Network Telescope Data
Zhenxin Zhan
Maochao Xu
Shouhuai Xu
44
29
0
24 Mar 2016
Predicting Cyber Attack Rates with Extreme Values
Zhenxin Zhan
Maochao Xu
Shouhuai Xu
AAML
36
93
0
24 Mar 2016
A Survey on Security Metrics
Marcus Pendleton
Richard B. Garcia-Lebron
Shouhuai Xu
52
13
0
20 Jan 2016
Online classifier adaptation for cost-sensitive learning
Junlin Zhang
José García
OffRL
50
5
0
23 Mar 2015
Cybersecurity Dynamics
Shouhuai Xu
67
58
0
18 Feb 2015
Impacts of Bad Data on the PMU based Line Outage Detection
Xuan Liu
Zhiyi Li
Zuyi Li
20
14
0
14 Feb 2015
Regularized maximum correntropy machine
Jim Jing-Yan Wang
Yunji Wang
Bing-Yi Jing
Xin Gao
44
21
0
18 Jan 2015
1