{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:02:47Z","timestamp":1758268967052,"version":"3.37.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319983844"},{"type":"electronic","value":"9783319983851"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98385-1_16","type":"book-chapter","created":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T23:47:49Z","timestamp":1532562469000},"page":"229-243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Comprehensive Methodology for Deploying IoT Honeypots"],"prefix":"10.1007","author":[{"given":"Antonio","family":"Acien","sequence":"first","affiliation":[]},{"given":"Ana","family":"Nieto","sequence":"additional","affiliation":[]},{"given":"Gerardo","family":"Fernandez","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,27]]},"reference":[{"unstructured":"Danova, T.: 75 billion devices will be connected to the internet of things by 2020. Business Insider, vol. 2 (2013)","key":"16_CR1"},{"issue":"9","key":"16_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MC.2011.291","volume":"44","author":"R Roman","year":"2011","unstructured":"Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Computer 44(9), 51\u201358 (2011)","journal-title":"Computer"},{"doi-asserted-by":"crossref","unstructured":"Kambourakis, G., Kolias, C., Stavrou, A.: The mirai botnet and the IoT zombie armies. In: Military Communications Conference (MILCOM) MILCOM 2017 IEEE, pp. 267\u2013272. IEEE (2017)","key":"16_CR3","DOI":"10.1109\/MILCOM.2017.8170867"},{"unstructured":"Business Insider: This one chart explains why cybersecurity is so important. Retriev. August 16, 2016 (2016)","key":"16_CR4"},{"unstructured":"Nawrocki, M., W\u00e4hlisch, M., Schmidt, T.C., Keil, C., Sch\u00f6nfelder, J.: A survey on honeypot software and data analysis, arXiv preprint \narXiv:1608.06249\n\n (2016)","key":"16_CR5"},{"key":"16_CR6","first-page":"1","volume":"9","author":"YMP Pa","year":"2015","unstructured":"Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IOTPOT: analysing the rise of IOT compromises. EMU 9, 1 (2015)","journal-title":"EMU"},{"doi-asserted-by":"crossref","unstructured":"Guarnizo, J.D., et al.: SIPHON: Towards scalable high-interaction physical honeypots. In: Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, pp. 57\u201368. ACM (2017)","key":"16_CR7","DOI":"10.1145\/3055186.3055192"},{"unstructured":"Luo, T., Xu, Z., Jin, X., Jia, Y., Ouyang, X.: IoTCandyJar: towards an intelligent-interaction honeypot for IoT devices. Black Hat (2017)","key":"16_CR8"},{"unstructured":"Krishnaprasad, P.: Capturing attacks on IoT devices with a multi-purpose IoT honeypot. Ph.D. dissertation, Indian Institute of Technology Kanpur (2017)","key":"16_CR9"},{"unstructured":"Radice, A.: Playing with a mirai honeypot: Mtpot (2017)","key":"16_CR10"},{"unstructured":"Wang, M., Santillan, J., Kuipers, F.: ThingPot: an interactive Internet-of-Things honeypot (2017)","key":"16_CR11"},{"doi-asserted-by":"crossref","unstructured":"Dowling, S., Schukat, M., Melvin, H.: A ZigBee honeypot to assess IoT cyberattack behaviour. In: Signals and Systems Conference (ISSC) : 28th Irish IEEE 2017, pp. 1\u20136 (2017)","key":"16_CR12","DOI":"10.1109\/ISSC.2017.7983603"},{"doi-asserted-by":"crossref","unstructured":"Jicha, A., Patton, M., Chen, H.: SCADA honeypots: an in-depth analysis of Conpot. In: Intelligence and Security Informatics (ISI) IEEE Conference on 2016, pp. 196\u2013198. IEEE (2016)","key":"16_CR13","DOI":"10.1109\/ISI.2016.7745468"},{"unstructured":"Singh, J.P., Chauhan, A.: Detection and prevention of non-pc Botnets","key":"16_CR14"},{"doi-asserted-by":"crossref","unstructured":"Wardak, H., Zhioua, S., Almulhem, A.: PLC access control: a security analysis. In: World Congress on 2016 Industrial Control Systems Security (WCICSS), pp. 1\u20136. IEEE (2016)","key":"16_CR15","DOI":"10.1109\/WCICSS.2016.7882935"},{"unstructured":"Trujano, G.B.R.R.F., Chan, B., Beams, G., Rivera, R.: Security analysis of DJI phantom 3 standard. Mass. Inst. Technol. (2016)","key":"16_CR16"},{"unstructured":"Szabo, M.: Drone hacking (2017)","key":"16_CR17"},{"unstructured":"Fox-Brewster, T.: Watch a very vulnerable USD140 Quadcopter drone get hacked out of the sky (2017)","key":"16_CR18"},{"unstructured":"Hughes, M.: Why the iKettle hack should worry you (even if you don\u2019t own one) (2015)","key":"16_CR19"},{"unstructured":"PenTestPartners: Hacking defcon 23\u2019s IoT village samsung fridge (2015)","key":"16_CR20"},{"unstructured":"Munro, K.: Extracting your WPA-PSK from bathroom scales (2015)","key":"16_CR21"},{"doi-asserted-by":"crossref","unstructured":"Ronen, E., Shamir, A., Weingarten, A.-O., O\u2019Flynn, C.: IoT goes nuclear: creating a ZigBee chain reaction. In: IEEE Symposium on 2017 Security and Privacy (SP), pp. 195\u2013212. IEEE (2017)","key":"16_CR22","DOI":"10.1109\/SP.2017.14"},{"unstructured":"Hern, A.: CloudPets stuffed toys leak details of half a million users (2017)","key":"16_CR23"},{"unstructured":"Lab, K.: A windows-based spreader for MIRAI malware has been discovered (2017)","key":"16_CR24"},{"unstructured":"Edwards, S., Profetis, I.: Hajime: analysis of a decentralized internet worm for IoT devices. Rapidity Netw. 16 (2016)","key":"16_CR25"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98385-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T23:55:40Z","timestamp":1532562940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98385-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319983844","9783319983851"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98385-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}