{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T15:00:57Z","timestamp":1726066857153},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030334314"},{"type":"electronic","value":"9783030334321"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33432-1_5","type":"book-chapter","created":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T14:02:44Z","timestamp":1580824964000},"page":"89-107","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Framework for Studying Autonomic Computing Models in Cyber Deception"],"prefix":"10.1007","author":[{"given":"Sridhar","family":"Venkatesan","sequence":"first","affiliation":[]},{"given":"Shridatt","family":"Sugrim","sequence":"additional","affiliation":[]},{"given":"Jason A.","family":"Youzwak","sequence":"additional","affiliation":[]},{"given":"Cho-Yu J.","family":"Chiang","sequence":"additional","affiliation":[]},{"given":"Ritu","family":"Chadha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,5]]},"reference":[{"key":"5_CR1","unstructured":"Almeshekah MH, Spafford EH, Atallah MJ (2013) Improving security using deception. Center for Education and Research Information Assurance and Security, Purdue University, Tech. Rep. CERIAS Tech Report 13 (2013)."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Achleitner S, Porta TL, McDaniel P, Sugrim S, Krishnamurthy SV, Chadha R (2016) Cyber deception: Virtual networks to defend insider reconnaissance. In Proceedings of the 8th ACM CCS international workshop on managing insider security threats, pp. 57\u201368.","DOI":"10.1145\/2995959.2995962"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Bercovitch M, Renford M, Hasson L, Shabtai A, Rokach L, Elovici Y (2011) HoneyGen: An automated honeytokens generator. In Intelligence and Security Informatics (ISI), 2011 IEEE International Conference on, pp. 131\u2013136. IEEE.","DOI":"10.1109\/ISI.2011.5984063"},{"key":"5_CR4","unstructured":"BIND. \nhttp:\/\/www.bind9.ne\n\n."},{"issue":"10","key":"5_CR5","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1002\/sec.242","volume":"4","author":"TE Carroll","year":"2011","unstructured":"Carroll TE, Daniel G (2011) A game theoretic investigation of deception in network security. Security and Communication Networks 4, no. 10: pp. 1162\u20131172.","journal-title":"Security and Communication Networks"},{"key":"5_CR6","first-page":"800","volume":"2016","author":"CJ Chiang","year":"2016","unstructured":"Chiang CJ, Gottlieb YM, Sugrim S, Chadha R, Serban C, Poylisher A, Marvel LM, Santos J (2016) ACyDS: An adaptive cyber deception system. In Military Communications Conference, MILCOM 2016, pp. 800\u2013805.","journal-title":"In Military Communications Conference, MILCOM"},{"key":"5_CR7","unstructured":"Dionaea. \nhttps:\/\/github.com\/DinoTools\/dionaea\n\n. Retrieved on 17 July 2018."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Duan Q, Al-Shaer E, Jafarian H (2013) Efficient random route mutation considering flow and network constraints. In IEEE Conference on Communications and Network Security (CNS), pp. 260\u2013268.","DOI":"10.1109\/CNS.2013.6682715"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Fishburn PC (1970) Utility theory for decision making. No. RAC-R-105. Research analysis corp McLean, VA.","DOI":"10.21236\/AD0708563"},{"issue":"1","key":"5_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2882969","volume":"8","author":"Rajesh Ganesan","year":"2016","unstructured":"Ganesan R, Jajodia S, Shah A, Cam H (2016) Dynamic scheduling of cybersecurity analysts for minimizing risk using reinforcement learning. ACM Transactions on Intelligent Systems and Technology (TIST) 8, no. 1: pp. 4.","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Golla M, Beuscher B, Drmuth M (2016) On the security of cracking-resistant password vaults. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security, pp. 1230\u20131241. ACM.","DOI":"10.1145\/2976749.2978416"},{"issue":"3","key":"5_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1380584.1380585","volume":"40","author":"Markus C. Huebscher","year":"2008","unstructured":"Huebscher MC, McCann JA (2008) A survey of autonomic computing - degrees, models, and applications. ACM Computing Surveys (CSUR) 40, no. 3: pp. 7.","journal-title":"ACM Computing Surveys"},{"key":"5_CR13","volume-title":"An architectural blueprint for autonomic computing","author":"IBM Group","year":"2003","unstructured":"IBM Group (2003) An architectural blueprint for autonomic computing. IBM White paper."},{"key":"5_CR14","unstructured":"OpenFlow. \nhttps:\/\/www.opennetworking.org\/software-defined-standards\/specifications\/\n\n, retrieved on 17 July 2018."},{"volume-title":"Moving target defense: creating asymmetric uncertainty for cyber threats\u2019","year":"2011","key":"5_CR15","unstructured":"Jajodia S, Ghosh AK, Swarup V, Wang C, Wang XS, eds (2011) Moving target defense: creating asymmetric uncertainty for cyber threats.\u2019 Vol. 54. Springer Science & Business Media."},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Juels A, Rivest RL (2013) Honeywords: Making password-cracking detectable. In Proceedings of ACM SIGSAC conference on Computer & communications security, pp. 145\u2013160. ACM.","DOI":"10.1145\/2508859.2516671"},{"key":"5_CR17","unstructured":"Kippo - SSH Honeypot. \nhttps:\/\/github.com\/desaster\/kippo\n\n. Retrieved on 3 November 2018."},{"key":"5_CR18","unstructured":"Open vSwitch. \nhttps:\/\/www.openvswitch.org\/\n\n. Retrieved on 17 July 2018."},{"key":"5_CR19","unstructured":"Provos N (2003) Honeyd-a virtual honeypot daemon. In 10th DFN-CERT Workshop, Hamburg, Germany, vol. 2, p. 4."},{"key":"5_CR20","unstructured":"RYU. \nhttps:\/\/osrg.github.io\/ryu\/\n\n. Retrieved on 5 October 2018."},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Robertson S, Alexander S, Micallef J, Pucci J, Tanis J, Macera A (2015) CINDAM: Customized information networks for deception and attack mitigation. In IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW), pp. 114\u2013119. IEEE.","DOI":"10.1109\/SASOW.2015.23"},{"key":"5_CR22","volume-title":"Hoffman B","author":"S Venkatesan","year":"2018","unstructured":"Venkatesan S, Sugrim S, Izmailov R, Chiang CJ, Chadha R, Doshi B, Hoffman B, Newcomb EA, Buchler N. On Detecting Manifestation of Adversary Characteristics. Accepted in IEEE MILCOM, 2018."}],"container-title":["Adaptive Autonomous Secure Cyber Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33432-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T14:09:31Z","timestamp":1580825371000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33432-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030334314","9783030334321"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33432-1_5","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"5 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}