Basic Search / Search Result

  • Search Result: 3results Search Strategy: "Department of Computer Science and Information Engineering".edept (Phrase) and ekeyword.raw="honeynet"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Malicious Behavior Detection via IoT Honeynet with Physical and Virtualized Devices
    • Department of Computer Science and Information Engineering /108/ Master
    • Author: Wei-Xiang Wang Advisor: Shin-Ming Cheng
    • The ease of deployment, implementation, and usage of Internet of Things (IoT) devices make IoT appl…
    • Clicks: 496Downloads: 0
    • Full text public date 2025/08/20 (Intranet public)
    • Full text public date 2025/08/20 (Internet public)
    • Full text public date 2025/08/20 (National library)

    2

    Monitoring of Malware Attacks on Commercial Routers in an IoT Honeynet
    • Department of Computer Science and Information Engineering /107/ Master
    • Author: Yen-Chun Liu Advisor: Shin-Ming Cheng
    • IoT botnets have expanded much faster than imagination. Due to the limited computing power of IoT d…
    • Clicks: 914Downloads: 0
    • Full text public date 2024/08/27 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    3

    Design of Large-Scale IoT Honeynet form the Perspective of Virtualized Netwworks
    • Department of Computer Science and Information Engineering /107/ Master
    • Author: Jia-Jhun Lin Advisor: Shin-Ming Cheng
    • There are a lot of IoT honeypots luring adversaries to set malware on them. Those honeypots collect…
    • Clicks: 589Downloads: 0
    • Full text public date 2024/08/27 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)
    1