<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="http://hdl.handle.net/20.500.12253/199">
    <title>DSpace Collection:</title>
    <link>http://hdl.handle.net/20.500.12253/199</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="http://hdl.handle.net/20.500.12253/537" />
        <rdf:li rdf:resource="http://hdl.handle.net/20.500.12253/536" />
      </rdf:Seq>
    </items>
    <dc:date>2026-04-09T00:24:13Z</dc:date>
  </channel>
  <item rdf:about="http://hdl.handle.net/20.500.12253/537">
    <title>From Risk Awareness to Security Controls: Bene ts of Honeypots to Companies</title>
    <link>http://hdl.handle.net/20.500.12253/537</link>
    <description>Title: From Risk Awareness to Security Controls: Bene ts of Honeypots to Companies
Authors: Sergio, Nunes; Miguel, Correia
Abstract: Many companies are deploying their business on the Internet&#xD;
using web applications while the question of what is the risk to business&#xD;
operations of cyber-attacks remains unanswered. Risk awareness allows to&#xD;
identify and act upon the security risk of these applications. This paper&#xD;
analyzes di erent security frameworks commonly used by companies in&#xD;
order to evaluate the bene ts of honeypots in responding to each framework's&#xD;
requirements and, consequently, mitigating the risk.</description>
    <dc:date>2012-03-21T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://hdl.handle.net/20.500.12253/536">
    <title>Web Application Risk Awareness with High Interaction Honeypots</title>
    <link>http://hdl.handle.net/20.500.12253/536</link>
    <description>Title: Web Application Risk Awareness with High Interaction Honeypots
Authors: Sergio, Nunes; Miguel, Correia
Abstract: Muitas empresas estao a lançar o seu negócio na Internet usando&#xD;
aplicações web. O risk awareness permite mitigar o risco associado&#xD;
a essas aplicações. Este trabalho apresenta uma experiência com um&#xD;
conjunto de honeypots web de alta interação, de modo a analisar o comportamento&#xD;
dos atacantes. Diferentes security frameworks utilizadas por&#xD;
empresas são analisadas para avaliar os benefícios do uso de honeypots&#xD;
web no contexto da mitigação de risco.</description>
    <dc:date>2012-03-21T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

