{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T23:40:02Z","timestamp":1749685202359,"version":"3.41.0"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319487366"},{"type":"electronic","value":"9783319487373"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48737-3_5","type":"book-chapter","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T01:02:29Z","timestamp":1478048549000},"page":"83-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Practical Application Layer Emulation in Industrial Control System Honeypots"],"prefix":"10.1007","author":[{"given":"Kyle","family":"Girtz","sequence":"first","affiliation":[]},{"given":"Barry","family":"Mullins","sequence":"additional","affiliation":[]},{"given":"Mason","family":"Rice","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,3]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Buza, D., Juhasz, F., Miru, G., Felegyhazi, M., Holczer, T.: CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot, in Smart Grid Security, J. Cuellar (Ed.), Springer, Cham, Switzerland, pp. 181\u2013192 (2014)","DOI":"10.1007\/978-3-319-10329-7_12"},{"issue":"3","key":"5_CR2","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.ijcip.2009.06.001","volume":"2","author":"Yu-Lun Huang","year":"2009","unstructured":"Huang, Y., Cardenas, A., Amin, S., Lin, Z., Tsai, H., Sastry, S.: Understanding the physical and economic consequences of attacks on control systems, International Journal of Critical Infrastructure Protection, vol. 2(3), pp. 73\u201383 (2009)","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"5_CR3","unstructured":"Jaromin, R.: Emulation of Industrial Control Field Device Protocols, M.S. Thesis, Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio (2013)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Leita, C., Mermoud, K., Dacier, M.: ScriptGen: An automated script generation tool for Honeyd, Proceedings of the Twenty-First Annual Computer Security Applications Conference, pp. 203\u2013214 (2005)","DOI":"10.1109\/CSAC.2005.49"},{"key":"5_CR5","unstructured":"Provos, N.: A virtual honeypot framework, Proceedings of the Thirteenth USENIX Security Symposium, article no. 1 (2004)"},{"key":"5_CR6","unstructured":"Provos, N., Holz, T.: Virtual Honeypots: From Botnet Tracking to Intrusion Detection, Addison-Wesley Professional, Upper Saddle River, New Jersey (2007)"},{"key":"5_CR7","unstructured":"Warner, P.: Automatic Configuration of Programmable Logic Controller Emulators, M.S. Thesis, Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio (2015)"},{"key":"5_CR8","unstructured":"Winn, M.: Constructing Cost-Effective and Targetable ICS Honeypots Suited for Production Networks, M.S. Thesis, Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio (2015)"},{"key":"5_CR9","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.ijcip.2015.04.002","volume":"10","author":"Michael Winn","year":"2015","unstructured":"Winn, M., Rice, M., Dunlap, S., Lopez, J., Mullins, B.: Constructing cost-effective and targetable industrial control system honeypots for production networks, International Journal of Critical Infrastructure Protection, vol. 10, pp. 47\u201358 (2015)","journal-title":"International Journal of Critical Infrastructure Protection"}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection X"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48737-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T23:12:39Z","timestamp":1749683559000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48737-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319487366","9783319487373"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48737-3_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"3 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Infrastructure Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 March 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 March 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccip2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}