Recent posts

TypePostAuthorRepliesLast updated
Book pageREFERENCES jamie.riden010 years 9 weeks ago
Book pageFURTHER READING jamie.riden010 years 9 weeks ago
Book pageACKNOWLEDGEMENTS jamie.riden010 years 9 weeks ago
Book pageCONCLUSIONS jamie.riden010 years 9 weeks ago
Book pageOBFUSCATION jamie.riden010 years 9 weeks ago
Book pageWEB EXPLOITATION KITS OVERVIEW jamie.riden010 years 9 weeks ago
Imagebehind-the-scenes-of-malicious-webservers-figure6 jamie.riden010 years 9 weeks ago
Imagebehind-the-scenes-of-malicious-webservers-figure5 jamie.riden010 years 9 weeks ago
Imagebehind-the-scenes-of-malicious-webservers-figure3 jamie.riden010 years 9 weeks ago
Imagebehind-the-scenes-of-malicious-webservers-figure2 jamie.riden010 years 9 weeks ago
Imagebehind-the-scenes-of-malicious-webservers-figure1 jamie.riden010 years 9 weeks ago
Book pageAPPENDIX A: ABOUT CAPTURE-HPC jamie.riden010 years 9 weeks ago
Book pageSUMMARY & RECOMMENDATIONS jamie.riden010 years 9 weeks ago
Book pageIN-DEPTH ANALYSIS jamie.riden010 years 9 weeks ago
Book pageDEFENSE EVALUATION jamie.riden010 years 9 weeks ago
Book pageIDENTIFICATION OF MALICIOUS WEB SERVERS jamie.riden010 years 9 weeks ago
Book pageINTRODUCTION jamie.riden010 years 9 weeks ago
Book pageIntroduction drupal010 years 9 weeks ago
Imagefigure18 jamie.riden010 years 9 weeks ago
Book pageSERVER HONEYPOTS VS. CLIENT HONEYPOTS jamie.riden010 years 9 weeks ago
Imagefigure19 jamie.riden010 years 9 weeks ago
Book pageACKNOWLEDGEMENTS jamie.riden010 years 9 weeks ago
Book pageFUTURE WORK jamie.riden010 years 9 weeks ago
Imagefigure17 jamie.riden010 years 9 weeks ago
Imagefigure16 jamie.riden010 years 9 weeks ago