{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T18:15:28Z","timestamp":1777486528289,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642051173","type":"print"},{"value":"9783642051180","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-05118-0_51","type":"book-chapter","created":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T07:32:03Z","timestamp":1257319923000},"page":"741-755","source":"Crossref","is-referenced-by-count":29,"title":["Self Adaptive High Interaction Honeypots Driven by Game Theory"],"prefix":"10.1007","author":[{"given":"G\u00e9rard","family":"Wagener","sequence":"first","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Dulaunoy","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"51_CR1","unstructured":"Cheswick, B.: An evening with Berferd in which a cracker is lured, endured, and studied. In: Proc. Winter USENIX Conference, pp. 163\u2013174 (1992)"},{"key":"51_CR2","volume-title":"Honeypots: Tracking Hackers","author":"L. Spitzner","year":"2002","unstructured":"Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley Longman Publishing Co., Inc., Boston (2002)"},{"key":"51_CR3","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/DSN.2007.76","volume-title":"DSN 2007: Proceedings of the 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks","author":"D. Ramsbrock","year":"2007","unstructured":"Ramsbrock, D., Berthier, R., Cukier, M.: Profiling attacker behavior following SSH compromises. In: DSN 2007: Proceedings of the 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, Washington, DC, USA, pp. 119\u2013124. IEEE Computer Society, Los Alamitos (2007)"},{"key":"51_CR4","doi-asserted-by":"crossref","unstructured":"Alata, E., Nicomette, V., Kaaniche, M., Dacier, M., Herrb, M.: Lessons learned from the deployment of a high-interaction honeypot. In: Sixth European Dependable Computing Conference, EDCC 2006, pp. 39\u201346 (2006)","DOI":"10.1109\/EDCC.2006.17"},{"issue":"7","key":"51_CR5","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1109\/TPAMI.2005.147","volume":"27","author":"E. Vidal","year":"2005","unstructured":"Vidal, E., Thollard, F., de la Higuera, C., Casacuberta, F., Carrasco, R.: Probabilistic finite-state machines-part I. IEEE Trans. Pattern Anal. Mach. Intell.\u00a027(7), 1013\u20131025 (2005)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"51_CR6","volume-title":"Advanced Linux Programming","author":"M. Mitchell","year":"2001","unstructured":"Mitchell, M., Samuel, A.: Advanced Linux Programming. New Riders Publishing, Thousand Oaks (2001)"},{"key":"51_CR7","unstructured":"Love, R.: Linux Kernel Development, 2nd edn. Novell Press (2005)"},{"key":"51_CR8","unstructured":"Provos, N., Friedl, M., Honeyman, P.: Preventing privilege escalation. In: SSYM 2003: Proceedings of the 12th conference on USENIX Security Symposium, Berkeley, CA, USA, p. 16. USENIX Association (2003)"},{"key":"51_CR9","unstructured":"Greenwald, A.: Matrix games and nash equilibrium, Lecture (2007)"},{"issue":"6","key":"51_CR10","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MSECP.2003.1253575","volume":"1","author":"B. McCarty","year":"2003","unstructured":"McCarty, B.: The honeynet arms race. IEEE Security and Privacy\u00a01(6), 79\u201382 (2003)","journal-title":"IEEE Security and Privacy"},{"key":"51_CR11","unstructured":"Bellard, F.: Qemu, a fast and portable dynamic translator. In: ATEC 2005: Proceedings of the annual conference on USENIX Annual Technical Conference, Berkeley, CA, USA, p. 41\u201346. USENIX Association (2005)"},{"key":"51_CR12","volume-title":"Bash Cookbook: Solutions and Examples for Bash Users","author":"C. Newham","year":"2007","unstructured":"Newham, C., Vossen, J., Albing, C., Vossen, J.: Bash Cookbook: Solutions and Examples for Bash Users. O\u2019Reilly Media, Inc., Sebastopol (2007)"},{"key":"51_CR13","unstructured":"Turocy, T.: Gambit (2007), \n                    \n                      http:\/\/gambit.sourceforge.net\/"},{"key":"51_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/1455770.1455779","volume-title":"CCS 2008: Proceedings of the 15th ACM conference on Computer and communications security","author":"A. Dinaburg","year":"2008","unstructured":"Dinaburg, A., Royal, P., Sharif, M., Lee, W.: Ether: malware analysis via hardware virtualization extensions. In: CCS 2008: Proceedings of the 15th ACM conference on Computer and communications security, pp. 51\u201362. ACM, New York (2008)"},{"key":"51_CR15","doi-asserted-by":"crossref","unstructured":"Garg, N., Grosu, D.: Deception in honeynets: A game-theoretic analysis. In: Information Assurance and Security Workshop, 2007. IAW 2007. IEEE SMC, pp. 107\u2013113 (2007)","DOI":"10.1109\/IAW.2007.381921"},{"key":"51_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-75227-1_1","volume-title":"Formal Aspects in Security and Trust","author":"S. Bistarelli","year":"2007","unstructured":"Bistarelli, S., Dall\u2019Aglio, M., Peretti, P.: Strategic games on defense trees. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol.\u00a04691, pp. 1\u201315. Springer, Heidelberg (2007)"},{"key":"51_CR17","unstructured":"Sallhammar, K., Helvik, B.E., Knapskog, S.J.: A framework for predicting security and dependability measures in real-time. International Journal of Computer Science and Network Security\u00a07(3) (2007)"},{"issue":"1","key":"51_CR18","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s10207-004-0060-x","volume":"4","author":"K.W. Lye","year":"2005","unstructured":"Lye, K.W., Wing, J.M.: Game strategies in network security. International Journal of Information Security\u00a04(1), 71\u201386 (2005)","journal-title":"International Journal of Information Security"},{"key":"51_CR19","unstructured":"Nagaraja, S., Anderson, R.: The topology of covert conflict. Technical report, University of Cambridge (2005)"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-05118-0_51.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:20:29Z","timestamp":1619781629000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-05118-0_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642051173","9783642051180"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-05118-0_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}