{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T10:50:52Z","timestamp":1778151052224,"version":"3.51.4"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,4,8]],"date-time":"2021-04-08T00:00:00Z","timestamp":1617840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,8]],"date-time":"2021-04-08T00:00:00Z","timestamp":1617840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s12652-021-03229-2","type":"journal-article","created":{"date-parts":[[2021,4,8]],"date-time":"2021-04-08T16:02:20Z","timestamp":1617897740000},"page":"4865-4876","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["An adaptive honeypot using Q-Learning with severity analyzer"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5983-0098","authenticated-orcid":false,"given":"Shraddha","family":"Suratkar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5114-0458","authenticated-orcid":false,"given":"Kunjal","family":"Shah","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4396-4040","authenticated-orcid":false,"given":"Aditya","family":"Sood","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0900-2531","authenticated-orcid":false,"given":"Anay","family":"Loya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0589-2039","authenticated-orcid":false,"given":"Dhaval","family":"Bisure","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9579-8956","authenticated-orcid":false,"given":"Umesh","family":"Patil","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6551-3021","authenticated-orcid":false,"given":"Faruk","family":"Kazi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,8]]},"reference":[{"key":"3229_CR1","first-page":"8887","volume":"975","author":"O Ayeni","year":"2013","unstructured":"Ayeni O, Alese B, Omotosho L (2013) Design and implementation of a medium interaction honeypot. Int J Comput Appl 975:8887","journal-title":"Int J Comput Appl"},{"key":"3229_CR2","doi-asserted-by":"crossref","unstructured":"Bhanuprakash, C., Nijagunarya, Y. & Jayaram, M. (2014) A simple approach to sql joins in a relational algebraic notation. Int J Comput Appl 104(4)","DOI":"10.5120\/18190-9099"},{"issue":"10","key":"3229_CR3","first-page":"63","volume":"4","author":"ML Bringer","year":"2012","unstructured":"Bringer ML, Chelmecki CA, Fujinoki H (2012) A survey: recent advances and future trends in honeypot research. Int J Comput Netw Inform Security 4(10):63","journal-title":"Int J Comput Netw Inform Security"},{"key":"3229_CR4","doi-asserted-by":"crossref","unstructured":"Catuogno, L., Castiglione, A. & Palmieri, F. (2015) A honeypot system with honeyword-driven fake interactive sessions. In: 2015 international conference on high performance computing & simulation (HPCS), IEEE, pp. 187\u2013194","DOI":"10.1109\/HPCSim.2015.7237039"},{"key":"3229_CR5","doi-asserted-by":"crossref","unstructured":"Dowling, S., Schukat, M. & Barrett, E. (2018) Using reinforcement learning to conceal honeypot functionality. In: Joint European conference on machine learning and knowledge discovery in databases, Springer, pp. 341\u2013355","DOI":"10.1007\/978-3-030-10997-4_21"},{"key":"3229_CR6","doi-asserted-by":"crossref","unstructured":"Fraunholz, D., Krohmer, D., Anton, S. D. & Schotten, H. D. (2017) Investigation of cybercrime conducted by abusing weak or default passwords with a medium interaction honeypot. In: 2017 international conference on cyber security and protection of digital services (Cyber Security), IEEE, pp. 1\u20137","DOI":"10.1109\/CyberSecPODS.2017.8074855"},{"key":"3229_CR7","doi-asserted-by":"crossref","unstructured":"Hemavathy, N. & Indumathi, P. (2020) Deep learning-based hybrid dynamic biased track (dl-hdbt) routing for under water acoustic sensor networks. J Ambient Intell Human Comput pp 1\u201315","DOI":"10.1007\/s12652-020-02165-x"},{"key":"3229_CR8","doi-asserted-by":"crossref","unstructured":"Holz T, Raynal F (2005) Detecting honeypots and other suspicious environments. In: Proceedings from the sixth annual IEEE SMC information assurance workshop, IEEE, pp 29\u201336","DOI":"10.1109\/IAW.2005.1495930"},{"key":"3229_CR9","doi-asserted-by":"publisher","first-page":"133653","DOI":"10.1109\/ACCESS.2019.2941229","volume":"7","author":"B Jang","year":"2019","unstructured":"Jang B, Kim M, Harerimana G, Kim JW (2019) Q-learning algorithms: A comprehensive classification and applications. IEEE Access 7:133653\u2013133667","journal-title":"IEEE Access"},{"key":"3229_CR10","doi-asserted-by":"crossref","unstructured":"Jazayeri F, Shahidinejad A, Ghobaei-Arani M (2020) Autonomous computation offloading and auto-scaling the in the mobile fog computing: a deep reinforcement learning-based approach. Journal of Ambient Intelligence and Humanized Computing pp. 1\u201320","DOI":"10.1007\/s12652-020-02561-3"},{"key":"3229_CR11","doi-asserted-by":"crossref","unstructured":"Juels A, Rivest RL (2013) Honeywords: making password-cracking detectable. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, pp 145\u2013160","DOI":"10.1145\/2508859.2516671"},{"key":"3229_CR12","doi-asserted-by":"crossref","unstructured":"Kumar A, Abhishek K, Ghalib MR, Nerurkar P, Shah K, Chandane M, Bhirud S, Patel D, Busnel Y (2020) Towards cough sound analysis using the internet of things and deep learning for pulmonary disease prediction. Transactions on Emerging Telecommunications Technologies p e4184","DOI":"10.1002\/ett.4184"},{"key":"3229_CR13","doi-asserted-by":"crossref","unstructured":"Kumar A, Abhishek K, Shah K, Patel D, Jain Y, Chheda H, Nerurkar P (2020) Malware detection using machine learning. Iberoamerican Knowledge Graphs and Semantic Web Conference, Springer, pp. 61\u201371","DOI":"10.1007\/978-3-030-65384-2_5"},{"key":"3229_CR14","first-page":"146","volume-title":"Inductive logic programming","author":"N Lavrac","year":"1994","unstructured":"Lavrac N, Dzeroski S (1994) Inductive logic programming. Springer, WLP, pp 146\u2013160"},{"key":"3229_CR15","doi-asserted-by":"crossref","unstructured":"Mokube, I. & Adams, M. (2007) Honeypots: concepts, approaches, and challenges. In: Proceedings of the 45th annual southeast regional conference, pp. 321\u2013326","DOI":"10.1145\/1233341.1233399"},{"key":"3229_CR16","doi-asserted-by":"crossref","unstructured":"Naik N, Jenkins P, Savage N (2018) Threat-aware honeypot for discovering and predicting fingerprinting attacks using principal components analysis. In: 2018 IEEE symposium series on computational intelligence (SSCI), IEEE, pp 623\u2013630","DOI":"10.1109\/SSCI.2018.8628658"},{"key":"3229_CR17","doi-asserted-by":"crossref","unstructured":"Nerurkar P, Busnel Y, Ludinard R, Shah K, Bhirud S, Patel D (2020) Detecting illicit entities in bitcoin using supervised learning of ensemble decision trees. In: Proceedings of the 2020 10th international conference on information communication and management, pp 25\u201330","DOI":"10.1145\/3418981.3418984"},{"issue":"2","key":"3229_CR18","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s11416-010-0144-2","volume":"7","author":"V Nicomette","year":"2011","unstructured":"Nicomette V, Kaaniche M, Alata E, Herrb M (2011) Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. J Comput Virol 7(2):143\u2013157","journal-title":"J Comput Virol"},{"issue":"3","key":"3229_CR19","doi-asserted-by":"publisher","first-page":"842","DOI":"10.17148\/IJARCCE.2017.63197","volume":"6","author":"S Paliwal","year":"2017","unstructured":"Paliwal S (2017) Honeypot: A trap for attackers. Int J Adv Res Comput Commun Eng 6(3):842\u2013845","journal-title":"Int J Adv Res Comput Commun Eng"},{"key":"3229_CR20","doi-asserted-by":"crossref","unstructured":"Pauna A (2012) Improved self-adaptive honeypots capable of detecting rootkit malware. In: 9th international conference on communications (COMM), IEEE, pp. 281\u2013284","DOI":"10.1109\/ICComm.2012.6262612"},{"key":"3229_CR21","doi-asserted-by":"crossref","unstructured":"Pauna A, Bica I (2014) Rassh-reinforced adaptive ssh honeypot. In: 10th international conference on communications (COMM), IEEE, pp. 1\u20136","DOI":"10.1109\/ICComm.2014.6866707"},{"key":"3229_CR22","doi-asserted-by":"crossref","unstructured":"Pauna A, Patriciu VV (2014) Casshh\u2013case adaptive ssh honeypot. In: International conference on security in computer networks and distributed systems, Springer, pp. 322\u2013333","DOI":"10.1007\/978-3-642-54525-2_29"},{"key":"3229_CR23","doi-asserted-by":"crossref","unstructured":"Pauna A, Iacob A-C, Bica I (2018) Qrassh-a self-adaptive ssh honeypot driven by q-learning. In: International conference on communications (COMM), IEEE, pp 441\u2013446","DOI":"10.1109\/ICComm.2018.8484261"},{"key":"3229_CR24","unstructured":"Pavate A, Kumawat D, Pansambal S, Nerurkar P, Bansode R (n.d.) Machine learning under attack: literature survey. Mach Learning 14, 14\u201318"},{"key":"3229_CR25","doi-asserted-by":"crossref","unstructured":"Rahmatullah DK, Nasution SM, Azmi F (2016) Implementation of low interaction web server honeypot using cubieboard. In: International conference on control, electronics, renewable energy and communications (ICCEREC), IEEE, pp 127\u2013131","DOI":"10.1109\/ICCEREC.2016.7814970"},{"key":"3229_CR26","doi-asserted-by":"crossref","unstructured":"Shah K, Bhandare D, Bhirud S (n.d.) Face recognition-based automated attendance system. In: International conference on innovative computing and communications, Springer, pp. 945\u2013952","DOI":"10.1007\/978-981-15-5113-0_79"},{"issue":"1","key":"3229_CR27","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s11859-016-1140-2","volume":"21","author":"L Shi","year":"2016","unstructured":"Shi L, Zhao J, Jiang L, Xing W, Gong J, Liu X (2016) Game theoretic simulation on the mimicry honeypot. Wuhan Univ J Nat Sci 21(1):69\u201374","journal-title":"Wuhan Univ J Nat Sci"},{"key":"3229_CR28","unstructured":"Spitzner, L. (2003) Honeypots: tracking hackers. vol. 1, Reading: Addison- Wesley."},{"key":"3229_CR29","doi-asserted-by":"crossref","unstructured":"Stolfo S, Bellovin S, Hershkop S, Keromytis A, Sinclair S, Smith S (2008) Insider attack and cyber security. Advances in information security, ISBN 978-0-387-77322-3","DOI":"10.1007\/978-0-387-77322-3"},{"key":"3229_CR30","first-page":"1","volume":"2020","author":"Z Tian","year":"2020","unstructured":"Tian Z, Si X, Zheng Y, Chen Z, Li X (2020) Multi-step medical image segmentation based on reinforcement learning. J Ambient Intell Human Comput Online First 2020:1\u201312","journal-title":"J Ambient Intell Human Comput Online First"},{"key":"3229_CR31","doi-asserted-by":"crossref","unstructured":"Wagener G, State R, Engel T, Dulaunoy A (2011) Adaptive and self- configurable honeypots. In: 12th IFIP\/IEEE international symposium on integrated network management (IM 2011) and workshops, IEEE, pp. 345\u2013 352","DOI":"10.1109\/INM.2011.5990710"},{"issue":"5","key":"3229_CR32","doi-asserted-by":"publisher","first-page":"2474","DOI":"10.1109\/TSG.2017.2670144","volume":"8","author":"K Wang","year":"2017","unstructured":"Wang K, Du M, Maharjan S, Sun Y (2017) Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans Smart Grid 8(5):2474\u20132482","journal-title":"IEEE Trans Smart Grid"},{"key":"3229_CR33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.12345","author":"D Wang","year":"2018","unstructured":"Wang D, Cheng H, Wang P, Yan J, Huang X (2018) A security analysis of honeywords. NDSS. https:\/\/doi.org\/10.14722\/ndss.2018.12345","journal-title":"NDSS"},{"key":"3229_CR34","doi-asserted-by":"crossref","unstructured":"Wang X, Guo N, Gao F, Feng J. (2019) Distributed denial of service attack defense simulation based on honeynet technology. Journal of Ambient Intelligence and Humanized Computing pp. 1\u201316","DOI":"10.1007\/s12652-019-01396-x"},{"key":"3229_CR35","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wan, Q., Qin, Y., Fan, S. & Xiao, Z. (2020) Research on intelligent algorithm for alerting vehicle impact based on multi-agent deep reinforcement learning. Journal of Ambient Intelligence and Humanized Computing pp. 1\u201311","DOI":"10.1007\/s12652-020-02198-2"},{"key":"3229_CR36","unstructured":"Yeh C-H, Yang C-H (2008) Design and implementation of honeypot systems based on open-source software. In: IEEE international conference on intelligence and security informatics. IEEE, pp. 265\u2013266"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03229-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-03229-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03229-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T18:31:19Z","timestamp":1663871479000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-03229-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,8]]},"references-count":36,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["3229"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-03229-2","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,8]]},"assertion":[{"value":"13 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}