Results 31 to 40 of about 9,357 (192)
Hornet 40: Network dataset of geographically placed honeypots
Deception technologies, and honeypots in particular, have been used for decades to understand how cyber attacks and attackers work. A myriad of factors impact the effectiveness of a honeypot.
Veronica Valeros, Sebastian Garcia
doaj +1 more source
Passport: Enabling Accurate Country-Level Router Geolocation using Inaccurate Sources [PDF]
When does Internet traffic cross international borders? This question has major geopolitical, legal and social implications and is surprisingly difficult to answer.
Choffnes, David +2 more
core +1 more source
Survival Analysis and Prediction Model of IP Address Assignment Duration
IP addresses of end hosts change when they are re-assigned. We apply survival analysis, which is commonly used in healthcare, on IP addresses to predict their assignment duration (their lifetime). We propose a survival parametric model based on a history
Dan Komosny, Saeed Ur Rehman
doaj +1 more source
Geotagging One Hundred Million Twitter Accounts with Total Variation Minimization [PDF]
Geographically annotated social media is extremely valuable for modern information retrieval. However, when researchers can only access publicly-visible data, one quickly finds that social media users rarely publish location information. In this work, we
Allen, David +2 more
core +1 more source
A High Completeness PoP Partition Algorithm for IP Geolocation
Point of Presence (PoP) composed of routing nodes with specific connections can reflect structural properties of a local target network, which can be used for capturing the network dynamics and geolocating target IPs.
Fuxiang Yuan +4 more
doaj +1 more source
Dataset of intrusion detection alerts from a sharing platform
The dataset contains intrusion detection alerts obtained via an alert sharing platform (SABU) for one week. A plethora of heterogeneous intrusion detection systems deployed across several organizations contributed to the sharing platform.
Martin Husák +3 more
doaj +1 more source
A Method for Cheating Indication in Unproctored On-Line Exams
COVID-19 has disrupted every field of life and education is not immune to it. Student learning and examinations moved on-line on a few weeks notice, which has created a large workload for academics to grade the assessments and manually detect students ...
Dan Komosny, Saeed Ur Rehman
doaj +1 more source
Geolocating tweets via spatial inspection of information inferred from tweet meta-fields
In the last 10, years the Twitter social network has become a robust messaging platform. To date, Twitter has more than 500 million users worldwide. A given tweet can contain the geographic location of the transmitting device if the geolocation services ...
Motti Zohar
doaj +1 more source
IP Geolocation Accuracy Evaluation Based on Crowdsourcing
Abstract IP geolocation is a crucial technology in the study of many fields, such as network measurement, fraud detection, and location-based advertising, etc. For over a decade, numerous researches and applications in this area have gained significant advances.
Guangyu Zhu +4 more
openaire +1 more source
DNS dataset for malicious domains detection
The Domain Name Service (DNS) is a central point in the functioning of the internet. Just as organizations use domain names to enable the access to their computational services, malicious actors make use of domain names to point to the services under ...
Cláudio Marques +2 more
doaj +1 more source

