Publications

 


Publications

Guides

Academic Journals and Proceedings

  • “Exploring Extensions of Traditional Honeypot Systems and Testing the Impact on Attack Profiling”. Masters Thesis, Mississippi
    State University Department of Computer Science, 2005. PDF

    • For a while, you could buy this on Amazon for about 60 bucks, although I’m not sure why you would. I can’t seem to find it on
      there anymore, but it was good for laughs while it lasted.
  • R. McGrew and R. Vaughn, “GooSweep: Mining Search Engines to Acquire Network Forensic Evidence,” Third Annual IFIP WG 11.9 International Conference on Digital Forensics, 2007.
  • Robert McGrew, Rayford B. Vaughn JR,, “Experiences with Honeypot Systems: Development, Deployment, and Analysis,” hicss, p. 220a, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS’06) Track 9, 2006.Link
  • McRae, C., McGrew, R. and Vaughn, R., “Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams,” Journal of Digital Forensic Practice 1 (03), September 2006, pp. 193-199. Link
    • You may or may not be able to read this from that link, depending if you’re coming from an organization that has a subscription to the
      service. Google indexes the PDF, but the resulting link forwards you along to the above. This may be a fun exercise for the reader.

Citations and Acknowledgements

  • Craig M. McRae, Rayford B. Vaughn, “Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks,” hicss , p. 270c, 2007.
  • “The Reality of Risks from Consented use of USB Devices”, Al-Zarouni, Proceedings of 4th Australian Information Security Management Conference, 2006

 Leave a Reply

(required)

(required)

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

© 2012 McGrew Security Suffusion theme by Sayontan Sinha