{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:20:44Z","timestamp":1759335644318},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030393021"},{"type":"electronic","value":"9783030393038"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-39303-8_23","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T09:03:03Z","timestamp":1579856583000},"page":"299-312","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Cyber Deception in the Internet of\u00a0Battlefield Things: Techniques, Instances, and Assessments"],"prefix":"10.1007","author":[{"given":"Jeman","family":"Park","sequence":"first","affiliation":[]},{"given":"Aziz","family":"Mohaisen","sequence":"additional","affiliation":[]},{"given":"Charles A.","family":"Kamhoua","sequence":"additional","affiliation":[]},{"given":"Michael J.","family":"Weisman","sequence":"additional","affiliation":[]},{"given":"Nandi O.","family":"Leslie","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Njilla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,25]]},"reference":[{"key":"23_CR1","unstructured":"Community detection for networkx. http:\/\/python-louvain.readthedocs.io"},{"key":"23_CR2","unstructured":"node2vec repository. https:\/\/github.com\/aditya-grover\/node2vec"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Belkin, M., Niyogi, P.: Laplacian eigenmaps and spectral techniques for embedding and clustering. In: Proceedings of the NIPS (2002)","DOI":"10.7551\/mitpress\/1120.003.0080"},{"key":"23_CR4","unstructured":"Cameron, L.: Internet of things meets the military and battlefield: connecting gear and biometric wearables for an IoMT and IoBT. https:\/\/www.computer.org\/publications\/tech-news\/research\/internet-of-military-battlefield-things-iomt-iobt"},{"key":"23_CR5","unstructured":"Cheswick, B.: An evening with berferd in which a cracker is lured, endured, and studied. In: Proceedings of the USENIX Conference (1992)"},{"issue":"1","key":"23_CR6","first-page":"17","volume":"5","author":"P Erdos","year":"1960","unstructured":"Erdos, P., R\u00e9nyi, A.: On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci. 5(1), 17\u201360 (1960)","journal-title":"Publ. Math. Inst. Hung. Acad. Sci."},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Gallagher, B., Eliassi-Rad, T.: Leveraging label-independent features for classification in sparsely labeled networks: an empirical study. In: Proceedings of the SNAKDD (2010)","DOI":"10.1007\/978-3-642-14929-0_1"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: Proceedings of the ACM KDD (2016)","DOI":"10.1145\/2939672.2939754"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Henderson, K., et al.: It\u2019s who you know: graph mining using recursive structural features. In: Proceedings of the ACM KDD (2011)","DOI":"10.1145\/2020408.2020512"},{"issue":"12","key":"23_CR10","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MC.2016.355","volume":"49","author":"A Kott","year":"2016","unstructured":"Kott, A., Swami, A., West, B.J.: The internet of battle things. IEEE Comput. 49(12), 70\u201375 (2016)","journal-title":"IEEE Comput."},{"key":"23_CR11","unstructured":"Leskovec, J., Krevl, A.: SNAP datasets: stanford large network dataset collection (2014). https:\/\/snap.stanford.edu\/data\/p2p-Gnutella04.html"},{"key":"23_CR12","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-319-05149-9_5","volume-title":"Information Security Applications","author":"A Mohaisen","year":"2014","unstructured":"Mohaisen, A., Hollenbeck, S.: Improving social network-based sybil defenses by rewiring and augmenting social graphs. In: Kim, Y., Lee, H., Perrig, A. (eds.) WISA 2013. LNCS, vol. 8267, pp. 65\u201380. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05149-9_5"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Pang, J., Zhang, Y.: DeepCity: a feature learning framework for mining location check-ins. arXiv preprint arXiv:1610.03676 (2016)","DOI":"10.1609\/icwsm.v11i1.14906"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: Proceedings of the ACM KDD (2014)","DOI":"10.1145\/2623330.2623732"},{"key":"23_CR16","unstructured":"Provos, N.: Honeyd-a virtual honeypot daemon. In: Proceedings of the DFN-CERT Workshop (2003)"},{"issue":"5500","key":"23_CR17","doi-asserted-by":"publisher","first-page":"2323","DOI":"10.1126\/science.290.5500.2323","volume":"290","author":"ST Roweis","year":"2000","unstructured":"Roweis, S.T., Saul, L.K.: Nonlinear dimensionality reduction by locally linear embedding. Science 290(5500), 2323\u20132326 (2000)","journal-title":"Science"},{"issue":"2","key":"23_CR18","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MSECP.2003.1193207","volume":"99","author":"L Spitzner","year":"2003","unstructured":"Spitzner, L.: The honeynet project: trapping the hackers. IEEE Secur. Priv. 99(2), 15\u201323 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: LINE: large-scale information network embedding. In: Proceedings of the WWW (2015)","DOI":"10.1145\/2736277.2741093"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-39303-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T17:13:25Z","timestamp":1722359605000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-39303-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030393021","9783030393038"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-39303-8_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Information Security Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wisa.or.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}