↓ Skip to main content

Secure IT Systems

Overview of attention for book
Cover of 'Secure IT Systems'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Privacy-Preserving Distributed Economic Dispatch Protocol for Smart Grid
  3. Altmetric Badge
    Chapter 2 Tracking Information Flow via Delayed Output
  4. Altmetric Badge
    Chapter 3 MixMesh Zones – Changing Pseudonyms Using Device-to-Device Communication in Mix Zones
  5. Altmetric Badge
    Chapter 4 AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications
  6. Altmetric Badge
    Chapter 5 Unifying Kleptographic Attacks
  7. Altmetric Badge
    Chapter 6 Steady
  8. Altmetric Badge
    Chapter 7 Revisiting Deniability in Quantum Key Exchange
  9. Altmetric Badge
    Chapter 8 On Security Analysis of Generic Dynamic Authenticated Group Key Exchange
  10. Altmetric Badge
    Chapter 9 A Blockchain-Assisted Hash-Based Signature Scheme
  11. Altmetric Badge
    Chapter 10 The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants
  12. Altmetric Badge
    Chapter 11 Verifiable Light-Weight Monitoring for Certificate Transparency Logs
  13. Altmetric Badge
    Chapter 12 CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs
  14. Altmetric Badge
    Chapter 13 Detection of Covert Channels in TCP Retransmissions
  15. Altmetric Badge
    Chapter 14 What You Can Change and What You Can’t: Human Experience in Computer Network Defenses
  16. Altmetric Badge
    Chapter 15 Attack Simulation for a Realistic Evaluation and Comparison of Network Security Techniques
  17. Altmetric Badge
    Chapter 16 Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection
  18. Altmetric Badge
    Chapter 17 Authorization Policies Specification and Consistency Management within Multi-cloud Environments
  19. Altmetric Badge
    Chapter 18 Cyber Hygiene: The Big Picture
  20. Altmetric Badge
    Chapter 19 Estimating the Risk of Fraud Against E-Services
  21. Altmetric Badge
    Chapter 20 PESTEL Analysis of Hacktivism Campaign Motivations
  22. Altmetric Badge
    Chapter 21 Data Modelling for Predicting Exploits
  23. Altmetric Badge
    Chapter 22 UpDroid: Updated Android Malware and Its Familial Classification
  24. Altmetric Badge
    Chapter 23 Evaluation of Cybersecurity Management Controls and Metrics of Critical Infrastructures: A Literature Review Considering the NIST Cybersecurity Framework
  25. Altmetric Badge
    Chapter 24 Next Generation Cryptographic Ransomware
  26. Altmetric Badge
    Chapter 25 Hardware-Assisted Program Execution Integrity: HAPEI
  27. Altmetric Badge
    Chapter 26 Protecting Instruction Set Randomization from Code Reuse Attacks
  28. Altmetric Badge
    Chapter 27 A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode
  29. Altmetric Badge
    Chapter 28 When Harry Met Tinder: Security Analysis of Dating Apps on Android
  30. Altmetric Badge
    Chapter 29 Threat Poker: Solving Security and Privacy Threats in Agile Software Development
Attention for Chapter 16: Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection
Altmetric Badge

Mentioned by

twitter
5 X users

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
13 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection
Chapter number 16
Book title
Secure IT Systems
Published by
Springer, Cham, November 2018
DOI 10.1007/978-3-030-03638-6_16
Book ISBNs
978-3-03-003637-9, 978-3-03-003638-6
Authors

Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser, Sentanoe, Stewart, Taubmann, Benjamin, Reiser, Hans P.

X Demographics

X Demographics

The data shown below were collected from the profiles of 5 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 13 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 13 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 5 38%
Student > Master 3 23%
Student > Doctoral Student 1 8%
Student > Bachelor 1 8%
Unknown 3 23%
Readers by discipline Count As %
Computer Science 9 69%
Unknown 4 31%