{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T02:28:20Z","timestamp":1677724100669},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T00:00:00Z","timestamp":1458604800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1007\/s11416-016-0270-6","type":"journal-article","created":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T09:38:21Z","timestamp":1458639501000},"page":"185-190","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Blackhole attack: user identity and password seize attack using honeypot"],"prefix":"10.1007","volume":"12","author":[{"given":"Hyung-Jin","family":"Mun","sequence":"first","affiliation":[]},{"given":"Kun-Hee","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,22]]},"reference":[{"issue":"13","key":"270_CR1","first-page":"251","volume":"5","author":"Hyung-Jin Mun","year":"2013","unstructured":"Mun, Hyung-Jin, Ju, Youngkwan, Yoo, Jinho: Multiple authentication system for privacy protection and efficient user authentication. Int. J. Adv. Comput. Technol. 5(13), 251\u2013256 (2013)","journal-title":"Int. J. Adv. Comput. Technol."},{"key":"270_CR2","doi-asserted-by":"crossref","unstructured":"Lee, A.: Authentication scheme for smart learning system in the cloud computing environment. J. Comput. Virol. Hack. Techn. 11(3), 149\u2013155 (2015)","DOI":"10.1007\/s11416-015-0240-4"},{"issue":"2","key":"270_CR3","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s11416-007-0050-4","volume":"3","author":"L Li","year":"2007","unstructured":"Li, L., Helenius, M.: Usability evaluation of anti-phishing toolbars. J. Comput. Virol. 3(2), 163\u2013184 (2007)","journal-title":"J. Comput. Virol."},{"key":"270_CR4","doi-asserted-by":"crossref","unstructured":"Abbasi, A.: Enhancing predictive analytics for anti-phishing by exploiting website genre information. J. Manag. Inf. Syst. 31(4) (2015)","DOI":"10.1080\/07421222.2014.1001260"},{"key":"270_CR5","first-page":"43","volume":"11","author":"RG Brody","year":"2007","unstructured":"Brody, R.G., Mulig, E., Kimball, V.: Phishing, pharming and identity theft. J. Acad. Acc. Financ. Stud. 11, 43\u201356 (2007)","journal-title":"J. Acad. Acc. Financ. Stud."},{"key":"270_CR6","first-page":"467","volume":"279","author":"A Kang","year":"2014","unstructured":"Kang, A., Lee, J., Kang, W., Barolli, L., Park, Jonghyuk: Security considerations for smart phone smishing attacks. Adv. Comput. Sci. Appl. Lect. Notes Electr. Eng. 279, 467\u2013473 (2014)","journal-title":"Adv. Comput. Sci. Appl. Lect. Notes Electr. Eng."},{"issue":"2","key":"270_CR7","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s11416-010-0144-2","volume":"7","author":"V Nicomette","year":"2011","unstructured":"Nicomette, V., Ka\u00e2niche, M., Alata, E., Herrb, M.: Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. J. Comput. Virol. 7(2), 143\u2013157 (2011)","journal-title":"J. Comput. Virol."},{"key":"270_CR8","doi-asserted-by":"crossref","DOI":"10.1201\/b10738","volume-title":"Honeypots: a new paradigm to information security","author":"RC Joshi","year":"2011","unstructured":"Joshi, R.C., Sardana, A.: Honeypots: a new paradigm to information security. CRC Press, New York (2011)"},{"issue":"1","key":"270_CR9","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/s11416-007-0064-y","volume":"4","author":"S Marechal","year":"2008","unstructured":"Marechal, S.: Advances in password cracking. J. Comput. Virol. 4(1), 73\u201381 (2008)","journal-title":"J. Comput. Virol."},{"key":"270_CR10","unstructured":"Sprengers, M., Batina, L.: Speeding up GPU-based password cracking, SHARCS 2012, Washington D.C. (2012)"},{"key":"270_CR11","unstructured":"Goodin, D.: 25-GPU cluster cracks every standard Windows password in 6 hours. http:\/\/arstechnica.com\/security\/2012\/12\/25-gpu-cluster-cracks-every-standard-windows-password-in-6-hours\/"},{"key":"270_CR12","unstructured":"Google, Sign in with your Google Account. https:\/\/www.google.com\/accounts\/recovery . Accessed 3 Mar 2016"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-016-0270-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-016-0270-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-016-0270-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T17:36:48Z","timestamp":1567705008000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-016-0270-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,22]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,8]]}},"alternative-id":["270"],"URL":"https:\/\/doi.org\/10.1007\/s11416-016-0270-6","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,22]]}}}