Beyond the Leak: Analyzing the Real-World Exploitation of Stolen Credentials Using Honeypots. [PDF]
Rabzelj M, Sedlar U.
europepmc +1 more source
Cross-regulation of [2Fe-2S] cluster synthesis by ferredoxin-2 and frataxin. [PDF]
Want K +9 more
europepmc +1 more source
Containerized cloud-based honeypot deception for tracking attackers. [PDF]
Priya VSD, Chakkaravarthy SS.
europepmc +1 more source
Analysis of Operant Self-administration Behaviors with Supervised Machine Learning: Protocol for Video Acquisition and Pose Estimation Analysis Using DeepLabCut and Simple Behavioral Analysis. [PDF]
Pereira Sanabria LF +6 more
europepmc +1 more source
A Novel Architecture for Mitigating Botnet Threats in AI-Powered IoT Environments. [PDF]
Memos VA +4 more
europepmc +1 more source
Evaluation of the Design and Development of the HeLe Newborn Hearing Screening Tele-Audiology Systems for the Philippines. [PDF]
Rosario AC +4 more
europepmc +1 more source
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypots. [PDF]
Valeros V, Garcia S.
europepmc +1 more source
Mapping Cyber Bot Behaviors: Understanding Payload Patterns in Honeypot Traffic. [PDF]
Wang S, Tu C, Zhang Y, Zhang M, Xue P.
europepmc +1 more source
A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture. [PDF]
Thilakarathne NN +3 more
europepmc +1 more source
Method for the detection of powdery mildew in tomato from electrical signalling. [PDF]
Matic S, Masoero G, Capra PP, Sosso A.
europepmc +1 more source

