Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

malware form

biblio

Visible to the public Detecting Ransomware with Honeypot Techniques

Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
  • Ransomware
  • malware
  • malware form
  • Metrics
  • Microsoft file server resource manager feature
  • Monitoring
  • Network
  • network administrators
  • pubcrawl
  • invasive software
  • ransomware activity detection
  • ransomware attacks
  • ransomware detection
  • Resiliency
  • Servers
  • social engineering methods
  • Windows security logs
  • witness tripwire files
  • Electronic mail
  • bogus computer resources
  • composability
  • computer security
  • Computers
  • Cryptography
  • cyber security
  • decoy computers
  • detect
  • activity
  • EventSentry
  • file screening service
  • file servers
  • honeypot
  • honeypot techniques
  • Human behavior
  • illicit access detection

Terms of Use  |  ©2023. CPS-VO