Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/hci/Endicott-PopovskyNSFOA09
%A Endicott-Popovsky, Barbara
%A Narvaez, Julia
%A Seifert, Christian
%A Frincke, Deborah A.
%A O'Neil, Lori Ross
%A Aval, Chiraag Uday
%B HCI (16)
%D 2009
%E Schmorrow, Dylan
%E Estabrooke, Ivy V.
%E Grootjen, Marc
%I Springer
%K dblp
%P 138-147
%T Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks.
%U http://dblp.uni-trier.de/db/conf/hci/hci2009-16.html#Endicott-PopovskyNSFOA09
%V 5638
%@ 978-3-642-02811-3
@inproceedings{conf/hci/Endicott-PopovskyNSFOA09,
added-at = {2021-10-14T00:00:00.000+0200},
author = {Endicott-Popovsky, Barbara and Narvaez, Julia and Seifert, Christian and Frincke, Deborah A. and O'Neil, Lori Ross and Aval, Chiraag Uday},
biburl = {https://www.bibsonomy.org/bibtex/28e951d3ec14fd69425079469ebd8da9d/dblp},
booktitle = {HCI (16)},
crossref = {conf/hci/2009-16},
editor = {Schmorrow, Dylan and Estabrooke, Ivy V. and Grootjen, Marc},
ee = {https://doi.org/10.1007/978-3-642-02812-0_17},
interhash = {c89d7f3c4953cc282680d07fc8c1248e},
intrahash = {8e951d3ec14fd69425079469ebd8da9d},
isbn = {978-3-642-02811-3},
keywords = {dblp},
pages = {138-147},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2024-04-10T22:33:39.000+0200},
title = {Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks.},
url = {http://dblp.uni-trier.de/db/conf/hci/hci2009-16.html#Endicott-PopovskyNSFOA09},
volume = 5638,
year = 2009
}