{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T08:41:55Z","timestamp":1772613715077,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T00:00:00Z","timestamp":1698364800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T00:00:00Z","timestamp":1698364800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100009392","name":"Prince Sattam bin Abdulaziz University","doi-asserted-by":"publisher","award":["PSAU\/2023\/R\/1444"],"award-info":[{"award-number":["PSAU\/2023\/R\/1444"]}],"id":[{"id":"10.13039\/100009392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Grid Computing"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10723-023-09689-4","type":"journal-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T11:03:21Z","timestamp":1698404601000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Honeypot Based Industrial Threat Detection Using Game Theory in Cyber-Physical System"],"prefix":"10.1007","volume":"21","author":[{"given":"Xiangming","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Laila","family":"Almutairi","sequence":"additional","affiliation":[]},{"given":"Theyab R.","family":"Alsenani","sequence":"additional","affiliation":[]},{"given":"Mohammad Nazir","family":"Ahmad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,27]]},"reference":[{"key":"9689_CR1","doi-asserted-by":"crossref","unstructured":"Marjan, G.: Dew computing architecture for cyber-physical systems and IoT. Int Things, 11, Sep. Art. no. 100186, (2020)","DOI":"10.1016\/j.iot.2020.100186"},{"key":"9689_CR2","doi-asserted-by":"crossref","unstructured":"Yan W., Xue Y., Li X., Weng J.: Integrated simulation and emulation platform for cyber-physical system security experimentation, in Proc. Int. Conf. High Confidence Netw. Syst., Beijing, China, Apr. 17\u201318, pp. 81\u201388 (2012)","DOI":"10.1145\/2185505.2185519"},{"key":"9689_CR3","first-page":"835","volume":"12\u201313","author":"S Duan","year":"2019","unstructured":"Duan, S., Zhang, Q., Cai, Y.: Research on industrial technology innovation strategic alliance based on alliance network: A case study based on three industrial alliances in zhejiang province. Proc. Int. Conf. Artif. Intell. Comput. Sci. 12\u201313, 835\u2013840 (2019)","journal-title":"Proc. Int. Conf. Artif. Intell. Comput. Sci."},{"key":"9689_CR4","unstructured":"Li, B., Wu, Y., Song, J., Lu, R., Li, T., Zhao, L.: DeepFed: Federated deep learning for intrusion detection in industrial cyber-physical systems, IEEE Trans. Ind. Inform., Sep. 11, early access (2020)"},{"key":"9689_CR5","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/OJCS.2020.3030825","volume":"1","author":"B Li","year":"2020","unstructured":"Li, B., Xiao, Y., Shi, Y., Kong, Q., Wu, Y., Bao, H.: Anti-Honeypot Enabled Optimal Attack Strategy for Industrial Cyber-Physical Systems. IEEE Open J, Comput. Soc.\u00a01, 250\u2013261 (2020)","journal-title":"IEEE Open Journal of the Computer Society"},{"issue":"4","key":"9689_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3337772","volume":"52","author":"J Pawlick","year":"2017","unstructured":"Pawlick, J., Colbert, E., Zhu, Q.: A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Comput. Surv. 52(4), 1\u201328 (2017)","journal-title":"ACM Comput. Surv."},{"key":"9689_CR7","unstructured":"Liu, L., Zhang, S., Zhang, L., Pan, G., Yu, J.: Multi-UUV Maneuvering Counter-Game for Dynamic Target Scenario Based on Fractional-Order Recurrent Neural Network. IEEE Transactions on Cybernetics, 1\u201314 (2022)"},{"issue":"5","key":"9689_CR8","doi-asserted-by":"publisher","first-page":"235","DOI":"10.3390\/fractalfract6050235","volume":"6","author":"L Liu","year":"2022","unstructured":"Liu, L., Wang, J., Zhang, L., Zhang, S.: Multi-AUV Dynamic Maneuver Countermeasure Algorithm Based on Interval Information Game and Fractional-Order DE. Fractal and Fractional 6(5), 235 (2022)","journal-title":"Fractal and Fractional"},{"issue":"2","key":"9689_CR9","doi-asserted-by":"publisher","first-page":"25","DOI":"10.4304\/jcp.2.2.25-36","volume":"2","author":"NC Rowe","year":"2007","unstructured":"Rowe, N.C., Custy, E.J., Duong, B.T.: Defending cyberspace with fake honeypots. J. Comput. 2(2), 25\u201336 (2007)","journal-title":"J. Comput."},{"key":"9689_CR10","unstructured":"Kwon, C., Liu, W., Hwang, I.: Security analysis for cyber-physical systems against stealthy deception attacks,\u201d in Proc. Amer. Control Conf., Washington, DC, USA, Jun. 17\u201319, pp. 3344\u20133349, (2013)"},{"issue":"3","key":"9689_CR11","doi-asserted-by":"publisher","first-page":"4022003","DOI":"10.1061\/(ASCE)ME.1943-5479.0001022","volume":"38","author":"Y Chen","year":"2022","unstructured":"Chen, Y., Zhu, L., Hu, Z., Chen, S.: Zheng, X, Risk Propagation in Multilayer Heterogeneous Network of Coupled System of Large Engineering Project. J. Manag. Eng. 38(3), 4022003 (2022)","journal-title":"J. Manag. Eng."},{"issue":"11","key":"9689_CR12","doi-asserted-by":"publisher","first-page":"2909","DOI":"10.1093\/comjnl\/bxac085","volume":"65","author":"P Chen","year":"2022","unstructured":"Chen, P., Liu, H., Xin, R., Carval, T., Zhao, J., Xia, Y.,... Zhao, Z.: Effectively Detecting Operational Anomalies In Large-Scale IoT Data Infrastructures By Using A GAN-Based Predictive Model. Comput. J.\u00a065(11), 2909\u20132925 (2022)","journal-title":"Comput J"},{"key":"9689_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, K., Wang, Z., Chen, G., Zhang, L., Yang, Y., Yao, C.,... Yao, J.: Training effective deep reinforcement learning agents for real-time life-cycle production optimization. J. Pet. Sci. Eng.\u00a0208, 109766 (2022)","DOI":"10.1016\/j.petrol.2021.109766"},{"key":"9689_CR14","doi-asserted-by":"crossref","unstructured":"Han, S., Ding, H., Zhao, S., Ren, S., Wang, Z., Lin, J.,... Zhou, S.: Practical and Robust Federated Learning With Highly Scalable Regression Training. IEEE Transactions on Neural Networks and Learning Systems (2023)","DOI":"10.1109\/TNNLS.2023.3271859"},{"key":"9689_CR15","doi-asserted-by":"crossref","unstructured":"Yang, Z., Xu, J., Yang, L., Zhang, X.: Optimized Dynamic Monitoring and Quality Management System for Post-Harvest Matsutake of Different Preservation Packaging in Cold Chain. Foods\u00a011(17), (2022)","DOI":"10.3390\/foods11172646"},{"issue":"12","key":"9689_CR16","doi-asserted-by":"publisher","first-page":"4905","DOI":"10.1109\/TSMC.2018.2884510","volume":"50","author":"Q Li","year":"2020","unstructured":"Li, Q., Lin, H., Tan, X., Du, S.: Consensus for Multiagent-Based Supply Chain Systems Under Switching Topology and Uncertain Demands. IEEE Trans. Syst. Man, Cybern. Syst.\u00a050(12), 4905\u20134918 (2020)","journal-title":"IEEE Trans Syst, Man, Cybern: Syst"},{"key":"9689_CR17","doi-asserted-by":"crossref","unstructured":"Dai, X., Xiao, Z., Jiang, H., Alazab, M., Lui, J. C. S., Dustdar, S.,... Liu, J.: Task Co-Offloading for D2D-Assisted Mobile Edge Computing in Industrial Internet of Things. IEEE Trans. Ind. Inform.\u00a019(1), 480-490, (2023)","DOI":"10.1109\/TII.2022.3158974"},{"issue":"8","key":"9689_CR18","doi-asserted-by":"publisher","first-page":"5309","DOI":"10.1109\/TII.2019.2961340","volume":"16","author":"B Cao","year":"2020","unstructured":"Cao, B., Zhao, J., Gu, Y., Fan, S., Yang, P.: Security-Aware Industrial Wireless Sensor Network Deployment Optimization. IEEE Trans. Ind. Inform. 16(8), 5309\u20135316 (2020)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"9689_CR19","doi-asserted-by":"publisher","first-page":"4074","DOI":"10.3390\/s18114074","volume":"18","author":"B Liu","year":"2018","unstructured":"Liu, B., Xu, H., Zhou, X.: Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things. Sensors 18, 4074 (2018)","journal-title":"Sensors"},{"key":"9689_CR20","doi-asserted-by":"publisher","first-page":"100576","DOI":"10.1016\/j.rineng.2022.100576","volume":"16","author":"A Pashaei","year":"2022","unstructured":"Pashaei, A., Akbari, M.E., Lighvan, M.Z., Charmin, A.: Early Intrusion Detection System using honeypot for industrial control networks. Results Eng. 16, 100576 (2022). (ISSN 2590-1230)","journal-title":"Results Eng."},{"key":"9689_CR21","doi-asserted-by":"publisher","first-page":"169944","DOI":"10.1109\/ACCESS.2020.3023764","volume":"8","author":"S SibiChakkaravarthy","year":"2020","unstructured":"SibiChakkaravarthy, S., Sangeetha, D., Cruz, M.V., Vaidehi, V., Raman, B.: Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks. IEEE Access 8, 169944\u2013169956 (2020)","journal-title":"IEEE Access"},{"key":"9689_CR22","doi-asserted-by":"publisher","first-page":"64075","DOI":"10.1109\/ACCESS.2020.2984795","volume":"8","author":"W Tian","year":"2020","unstructured":"Tian, W., Ji, X., Liu, W., Liu, G., Zhai, J., Dai, Y., Huang, S.: \u2018Prospect theoretic study of honeypot defense against advanced persistent threats in power grid.\u2019 IEEE Access 8, 64075\u201364085 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"9689_CR23","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/JSAC.2019.2894307","volume":"37","author":"W Fan","year":"2019","unstructured":"Fan, W., Du, Z., Smith-Creasey, M., Fernandez, D.: \u2018HoneyDOC: An efficient honeypot architecture enabling all-round design.\u2019 IEEE J. Sel. Areas Commun. 37(3), 683\u2013697 (2019)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"9689_CR24","doi-asserted-by":"publisher","first-page":"72234","DOI":"10.1109\/ACCESS.2019.2920239","volume":"7","author":"L Shi","year":"2019","unstructured":"Shi, L., Li, Y., Liu, T., Liu, J., Shan, B., Chen, H.: \u2018Dynamic distributed honeypot based on blockchain.\u2019 IEEE Access 7, 72234\u201372246 (2019)","journal-title":"IEEE Access"},{"key":"9689_CR25","doi-asserted-by":"publisher","first-page":"4199","DOI":"10.3390\/s20154199","volume":"20","author":"P Diamantoulakis","year":"2020","unstructured":"Diamantoulakis, P., Dalamagkas, C., Radoglou-Grammatikis, P., Sarigiannidis, P., Karagiannidis, G.: Game Theoretic Honeypot Deployment in Smart Grid. Sensors 20, 4199 (2020). https:\/\/doi.org\/10.3390\/s20154199","journal-title":"Sensors"},{"key":"9689_CR26","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/j.ins.2022.08.093","volume":"612","author":"B Wa Li","year":"2022","unstructured":"Wa Li, B., Zhou, X., Ning, Z., Guan, X., Yiu, K.: C, Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach. Inf. Sci. 612, 384\u2013398 (2022)","journal-title":"Inf. Sci."},{"key":"9689_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126391","volume":"548","author":"Y Deng","year":"2023","unstructured":"Deng, Y., Lv, J., Huang, D., Du, S.: Combining the theoretical bound and deep adversarial network for machinery open-set diagnosis transfer. Neurocomputing 548, 126391 (2023)","journal-title":"Neurocomputing"},{"key":"9689_CR28","doi-asserted-by":"crossref","unstructured":"Abolfathi, M., Shomorony, I., Vahid, A. and Jafarian, J.H.: A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks Using Multipath Routing and Deception. In Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, pp. 67\u201378 (2022)","DOI":"10.1145\/3532105.3535015"},{"key":"9689_CR29","unstructured":"Meisami, S., Beheshti-Atashgah, M. Aref, M.R.: Using blockchain to achieve decentralized privacy in IoT healthcare, (2021) arXiv preprint  arXiv:2109.14812"},{"key":"9689_CR30","doi-asserted-by":"crossref","unstructured":"Alahdadi, A., Safaei, A.A. and Ebadi, M.J.: A truthful and budget-balanced double auction model for resource allocation in cloud computing. Soft Comput. 1\u201322 (2023)","DOI":"10.1007\/s00500-023-08081-4"},{"issue":"04","key":"9689_CR31","doi-asserted-by":"publisher","first-page":"992","DOI":"10.5377\/nexo.v35i04.15540","volume":"35","author":"H Bozorgkhou","year":"2022","unstructured":"Bozorgkhou, H., Rokni, M.A.: Studying and investigating the impact of marketing mix factors on e-purchase via smart phones (case study: Digikala corporation). Nexo Revista Cient\u00edfica 35(04), 992\u20131003 (2022)","journal-title":"Nexo Revista Cient\u00edfica"},{"key":"9689_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108651","volume":"108","author":"X Wang","year":"2023","unstructured":"Wang, X., Wang, Y., Javaheri, Z., Almutairi, L., Moghadamnejad, N., Younes, O.S.: Federated deep learning for anomaly detection in the internet of things. Comput. Electr. Eng. 108, 108651 (2023)","journal-title":"Comput. Electr. Eng."},{"issue":"2","key":"9689_CR33","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/TNSM.2016.2541171","volume":"13","author":"B Cheng","year":"2016","unstructured":"Cheng, B., Zhu, D., Zhao, S., Chen, J.: Situation-Aware IoT Service Coordination Using the Event-Driven SOA Paradigm. IEEE Trans. Netw. Serv. Manage. 13(2), 349\u2013361 (2016)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"9689_CR34","doi-asserted-by":"crossref","unstructured":"Liu, X., He, J., Liu, M., Yin, Z., Yin, L.,... Zheng, W.; A Scenario-Generic Neural Machine Translation Data Augmentation Method. Electronics, 12(10), 2320 (2023)","DOI":"10.3390\/electronics12102320"},{"issue":"5","key":"9689_CR35","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MNET.011.1900536","volume":"34","author":"B Cao","year":"2020","unstructured":"Cao, B., Wang, X., Zhang, W., Song, H., Lv, Z.: A Many-Objective Optimization Model of Industrial Internet of Things Based on Private Blockchain. IEEE Network 34(5), 78\u201383 (2020)","journal-title":"IEEE Network"},{"key":"9689_CR36","unstructured":"Rababah, M., Maydanchi, M., Pouya, S., Basiri, M., Azad, A.N., Haji, F. and Aminjarahi, M.: Data Visualization of Traffic Violations in Maryland, US (2022). arXiv preprint  arXiv:2208.10543"},{"key":"9689_CR37","doi-asserted-by":"crossref","unstructured":"Liu, R.; Zhai, F.: Model Identification of Risk Management System. In Proceedings of the 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China, 12\u201314 1\u20134 (2008)","DOI":"10.1109\/WiCom.2008.2430"},{"key":"9689_CR38","doi-asserted-by":"crossref","unstructured":"Dowling, S., Schukat, M. and Melvin, H.\u201d A ZigBee honeypot to assess IoT cyberattack behaviour. In Signals and Systems Conference (ISSC), 2017 28th Irish (1\u20136). IEEE (2017)","DOI":"10.1109\/ISSC.2017.7983603"},{"issue":"3","key":"9689_CR39","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.32604\/iasc.2022.020801","volume":"31","author":"S Mubarak","year":"2022","unstructured":"Mubarak, S., Habaebi, M.H., Islam, M.R., Balla, A., Tahir, M., Elsheikh, E.A., Suliman, F.M.: Industrial datasets with ICS testbed and attack detection using machine learning techniques. Intell Autom Soft Comput 31(3), 1345\u20131360 (2022)","journal-title":"Intell Autom Soft Comput"},{"key":"9689_CR40","doi-asserted-by":"crossref","unstructured":"Dang, Q.-V.: Studying machine learning techniques for intrusion detection systems, Int. Conf. Future Data Security Eng. 411\u2013426 (2019)","DOI":"10.1007\/978-3-030-35653-8_28"},{"key":"9689_CR41","doi-asserted-by":"crossref","unstructured":"Q.V. Dang, T.H. Vo, Reinforcement learning for the problem of detecting intrusion in a computer system, in: Proceedings of Sixth International Congress on Information and Communication Technology, Springer, Singapore, 755\u2013762 (2022)","DOI":"10.1007\/978-981-16-2380-6_66"},{"issue":"17","key":"9689_CR42","doi-asserted-by":"publisher","first-page":"13343","DOI":"10.1109\/JIOT.2021.3065966","volume":"8","author":"K. Ma Tian","year":"2021","unstructured":"Tian, K.. Ma., et al.: Reliability-Constrained Throughput Optimization of Industrial Wireless Sensor Networks With Energy Harvesting Relay. IEEE Int. Things. J.\u00a08(17), 13343\u201313354 (2021)","journal-title":"IEEE Int Things J"},{"key":"9689_CR43","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.comcom.2022.02.002","volume":"187","author":"F Guo","year":"2022","unstructured":"Guo, F., Zhou, W., Lu, Q., Zhang, C.: Path extension similarity link prediction method based on matrix algebra in directed networks. Comput. Commun. 187, 83-92 41, 585\u2013598 (2022)","journal-title":"Comput. Commun."}],"container-title":["Journal of Grid Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-023-09689-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10723-023-09689-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-023-09689-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,26]],"date-time":"2023-12-26T19:09:12Z","timestamp":1703617752000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10723-023-09689-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,27]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["9689"],"URL":"https:\/\/doi.org\/10.1007\/s10723-023-09689-4","relation":{},"ISSN":["1570-7873","1572-9184"],"issn-type":[{"value":"1570-7873","type":"print"},{"value":"1572-9184","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,27]]},"assertion":[{"value":"8 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval and Consent to Participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"The authors declare that they have no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"59"}}