{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:13:29Z","timestamp":1742980409211,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030977733"},{"type":"electronic","value":"9783030977740"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-97774-0_31","type":"book-chapter","created":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T08:06:40Z","timestamp":1647245200000},"page":"340-351","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["APT Attack Heuristic Induction Honeypot Platform Based on Snort and OpenFlow"],"prefix":"10.1007","author":[{"given":"Bo","family":"Dai","sequence":"first","affiliation":[]},{"given":"Zhenhai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,15]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Gao, Y., Iqbal, S., et al.: Performance and power analysis of high-density multi-GPGPU architectures: a preliminary case study. In: IEEE 17th HPCC (2015)","DOI":"10.1109\/HPCC-CSS-ICESS.2015.68"},{"key":"31_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-030-05764-0_17","volume-title":"Smart Blockchain","author":"H Qiu","year":"2018","unstructured":"Qiu, H., Qiu, M., Memmi, G., Ming, Z., Liu, M.: A dynamic scalable blockchain based communication architecture for IoT. In: Qiu, M. (ed.) SmartBlock 2018. LNCS, vol. 11373, pp. 159\u2013166. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05764-0_17"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Thakur, K., Qiu, M., Gai, K., Ali, M.: An investigation on cyber security threats and security models. In: IEEE CSCloud (2015)","DOI":"10.1109\/CSCloud.2015.71"},{"key":"31_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-319-52015-5_24","volume-title":"Smart Computing and Communication","author":"K Gai","year":"2017","unstructured":"Gai, K., Qiu, M., Sun, X., Zhao, H.: Security and privacy issues: a survey on FinTech. In: Qiu, M. (ed.) SmartCom 2016. LNCS, vol. 10135, pp. 236\u2013247. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52015-5_24"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Wu, J., et al.: Jamming ACK attack to wireless networks and a mitigation approach. In: IEEE GLOBECOM Conference, pp. 1\u20135 (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.950"},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"101734","DOI":"10.1016\/j.cose.2020.101734","volume":"92","author":"B Stojanovi\u0107","year":"2020","unstructured":"Stojanovi\u0107, B., Hofer-Schmitz, K., Kleb, U.: APT datasets and attack modeling for automated detection methods: a review. Comput. Secur. 92, 101734 (2020)","journal-title":"Comput. Secur."},{"issue":"06","key":"31_CR7","first-page":"870","volume":"48","author":"R Chen","year":"2019","unstructured":"Chen, R., Zhang, X., Niu, W., et al.: Research on APT attack detection and countermeasure technology system. J. Univ. Elec. Sci. Tech. China 48(06), 870\u2013879 (2019)","journal-title":"J. Univ. Elec. Sci. Tech. China"},{"issue":"01","key":"31_CR8","first-page":"281","volume":"47","author":"L Hai-Bo","year":"2020","unstructured":"Hai-Bo, L.I.U., Tian-Bo, W.U., Jing, S.H.E.N., et al.: APT attack detection based on GAN-LSTM. Comput. Sci. 47(01), 281\u2013286 (2020)","journal-title":"Comput. Sci."},{"key":"31_CR9","first-page":"29","volume":"04","author":"Y Qin","year":"2018","unstructured":"Qin, Y., Liu, S., Liu, L.: Analysis of telecommunications fraud technique such as forged web pages and malicious links. J. Jiangxi Police Inst. 04, 29\u201333 (2018)","journal-title":"J. Jiangxi Police Inst."},{"issue":"02","key":"31_CR10","first-page":"498","volume":"41","author":"L-Y Shi","year":"2019","unstructured":"Shi, L.-Y., Li, Y., Ma, M.-F.: New development of honeypot technology research. J. Electron. Inf. Technol. 41(02), 498\u2013508 (2019)","journal-title":"J. Electron. Inf. Technol."},{"key":"31_CR11","first-page":"41","volume":"10","author":"C-Y Song","year":"2009","unstructured":"Song, C.-Y., Han, X.-H., Ye, Z.-Y.: Attack scene capture and reconstruction method based on honeynet technology. Netinfo Secur. 10, 41\u201343 (2009)","journal-title":"Netinfo Secur."},{"issue":"12","key":"31_CR12","first-page":"128","volume":"38","author":"Z-P Jia","year":"2017","unstructured":"Jia, Z.-P., Fang, B.-X., Liu, C.-G., et al.: Overview of network deception technology. J. Commun. 38(12), 128\u2013143 (2017)","journal-title":"J. Commun."},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.comcom.2020.06.003","volume":"160","author":"M Cicio\u011flu","year":"2020","unstructured":"Cicio\u011flu, M., \u00c7alhan, A.: Energy-efficient and SDN-enabled routing algorithm for wireless body area networks. Comput. Commun. 160, 228\u2013239 (2020)","journal-title":"Comput. Commun."},{"issue":"05","key":"31_CR14","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.3724\/SP.J.1001.2013.04390","volume":"24","author":"Q-Y Zuo","year":"2013","unstructured":"Zuo, Q.-Y., Chen, M., Zhao, G.-S., et al.: Research on SDN technology based on OpenFlow. J. Softw. 24(05), 1078\u20131097 (2013)","journal-title":"J. Softw."},{"key":"31_CR15","unstructured":"T-Pot documentation. https:\/\/dtag-dev-sec.github.io\/mediator\/feature\/2019\/04\/01\/tpot"}],"container-title":["Lecture Notes in Computer Science","Smart Computing and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-97774-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T08:12:56Z","timestamp":1647245576000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-97774-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030977733","9783030977740"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-97774-0_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"15 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SmartCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/smartcom\/2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"165","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference was held online due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}