DC FieldValueLanguage
dc.contributor.authorWählisch, Matthias-
dc.contributor.authorTrapp, Sebastian-
dc.contributor.authorKeil, Christian-
dc.contributor.authorSchönfelder, Jochen-
dc.contributor.authorSchmidt, Thomas C.-
dc.contributor.authorSchiller, Jochen-
dc.date.accessioned2020-08-26T09:19:50Z-
dc.date.available2020-08-26T09:19:50Z-
dc.date.issued2012-
dc.identifier.isbn978-1-4503-1419-0en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12738/1869-
dc.description.abstractComputer systems are commonly attacked by malicious transport contacts. We present a comparative study that analyzes to what extent those attacks depend on the network access, in particular if an adversary targets specifically on mobile or non-mobile devices. Based on a mobile honeypot that extracts first statistical results, our findings indicate that a few topological domains of the Internet have started to place particular focus on attacking mobile networks.en
dc.language.isoenen_US
dc.publisherAssociation for Computing Machinery. Special Interest Group on Data Communicationen_US
dc.subjectMobile vs. non-mobile attacksen_US
dc.subjectmobile honeypoten_US
dc.subject.ddc004: Informatiken_US
dc.titleFirst insights from a mobile honeypoten
dc.typeinProceedingsen_US
dc.relation.conferenceACM SIGCOMM 2012en_US
dc.description.versionUnknownen_US
tuhh.container.endpage306en_US
tuhh.container.startpage305en_US
tuhh.oai.showtrueen_US
tuhh.publication.instituteDepartment Informatiken_US
tuhh.publication.instituteFakultät Technik und Informatiken_US
tuhh.publisher.doi10.1145/2342356.2342422-
tuhh.publisher.urlhttp://conferences.sigcomm.org/sigcomm/2012/paper/sigcomm/p305.pdf-
tuhh.relation.ispartofseriesACM SIGCOMM : proceedings of the ACM SIGCOMM ... conference on SIGCOMMen_US
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)-
dc.type.casraiConference Paper-
dc.type.dinicontributionToPeriodical-
dc.type.drivercontributionToPeriodical-
dc.type.statusinfo:eu-repo/semantics/publishedVersionen_US
dcterms.DCMITypeText-
tuhh.book.titleProceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication-
item.creatorGNDWählisch, Matthias-
item.creatorGNDTrapp, Sebastian-
item.creatorGNDKeil, Christian-
item.creatorGNDSchönfelder, Jochen-
item.creatorGNDSchmidt, Thomas C.-
item.creatorGNDSchiller, Jochen-
item.fulltextNo Fulltext-
item.creatorOrcidWählisch, Matthias-
item.creatorOrcidTrapp, Sebastian-
item.creatorOrcidKeil, Christian-
item.creatorOrcidSchönfelder, Jochen-
item.creatorOrcidSchmidt, Thomas C.-
item.creatorOrcidSchiller, Jochen-
item.seriesrefACM SIGCOMM : proceedings of the ACM SIGCOMM ... conference on SIGCOMM-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.tuhhseriesidACM SIGCOMM : proceedings of the ACM SIGCOMM ... conference on SIGCOMM-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
item.openairetypeinProceedings-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0002-0956-7885-
crisitem.author.parentorgFakultät Technik und Informatik-
Appears in Collections:Publications without full text
Show simple item record

Page view(s)

86
checked on Dec 26, 2024

Google ScholarTM

Check

HAW Katalog

Check

Add Files to Item

Note about this record


Items in REPOSIT are protected by copyright, with all rights reserved, unless otherwise indicated.