{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T22:39:50Z","timestamp":1761863990287,"version":"3.37.3"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"USM RUI, Penang, Malaysia","award":["1001\/PKCOMP\/8014017"],"award-info":[{"award-number":["1001\/PKCOMP\/8014017"]}]},{"name":"Center for Cyber Safety and Education, United States Internal Revenue Segregated Fund of (ISC)\u00b2, through the (ISC)\u00b2 Women Cybersecurity Scholarship Award, Clearwater, FL, USA","award":["45-2405127"],"award-info":[{"award-number":["45-2405127"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2928359","type":"journal-article","created":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T15:54:52Z","timestamp":1562860492000},"page":"100881-100898","source":"Crossref","is-referenced-by-count":24,"title":["A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7801-2541","authenticated-orcid":false,"given":"Abiodun Esther","family":"Omolara","sequence":"first","affiliation":[]},{"given":"Aman","family":"Jantan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0138-6446","authenticated-orcid":false,"given":"Oludare","family":"Isaac Abiodun","sequence":"additional","affiliation":[]},{"given":"Kemi","family":"Victoria Dada","sequence":"additional","affiliation":[]},{"given":"Humaira","family":"Arshad","sequence":"additional","affiliation":[]},{"given":"Etuh","family":"Emmanuel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1038\/nature15263"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1126\/science.aad9480"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ICITST.2016.7856750"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/INFCOMW.2016.7562224"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1007\/s11042-015-2929-2"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1007\/s10796-010-9254-0"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1137\/S0036144598347011"},{"year":"2019","author":"de groot","journal-title":"The History of Data Breaches Digital Guardian","key":"ref36"},{"year":"2009","author":"paar","journal-title":"Understanding Cryptography","key":"ref35"},{"year":"2008","author":"silverman","journal-title":"An Introduction to Mathematical Cryptography","key":"ref34"},{"key":"ref60","article-title":"End-to-end adversarial learning for generative conversational agents","author":"ludwig","year":"2018","journal-title":"arXiv 1711 10122"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1613\/jair.4917","article-title":"Semi-supervised learning with induced word senses for state of the art word sense disambiguation","volume":"55","author":"ba?kaya","year":"2016","journal-title":"J Artif Intell Res"},{"key":"ref61","first-page":"384","article-title":"Word representations: A simple and general method for semi-supervised learning","author":"turian","year":"2010","journal-title":"Proc Annual Meeting of the Assoc Computational Linguistics"},{"year":"2012","author":"cover","journal-title":"Elements of Information Theory","key":"ref63"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/EIDWT.2013.53"},{"key":"ref64","first-page":"433","volume":"59","author":"turing","year":"1950","journal-title":"Computing machinery and intelligence"},{"key":"ref27","first-page":"6067","article-title":"A secure instant messaging scheme based on certificateless signcryption","volume":"10","author":"luo","year":"2014","journal-title":"J Comput Inf Syst"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1080\/00918360903275559"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.1145\/1741866.1741880"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/ICITACEE.2014.7065750"},{"doi-asserted-by":"publisher","key":"ref67","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref68","first-page":"552","article-title":"Secure channel coding schemes based on algebraic-geometric codes over hermitian curves","volume":"22","author":"alzubi","year":"2016","journal-title":"J UCS"},{"year":"2016","journal-title":"Global Risk Rep","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ACCESS.2019.2897923"},{"year":"2018","author":"greenberg","journal-title":"WhatsApp Flaws Could Allow Snoops to Slide into Group Chats","key":"ref20"},{"year":"2019","author":"shah","journal-title":"WhatsApp Hack Warning&#x2014;Newly Discovered Exploit Lets Hackers Access Your Group Chat to Spread Fake Messages","key":"ref22"},{"year":"2019","author":"pettit","journal-title":"WhatsApp Security Flaw Lets ANYONE SPY on Private Chats","key":"ref21"},{"year":"2019","journal-title":"Terrifying WhatsApp Flaw Allows Hackers to Impersonate You","key":"ref24"},{"year":"2019","journal-title":"Gizmodo","key":"ref23"},{"year":"2019","author":"kobeissi","journal-title":"Remarks on Viber Message Encryption","key":"ref26"},{"year":"2019","journal-title":"Threema","key":"ref25"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1145\/1741866.1741880"},{"key":"ref51","first-page":"20","article-title":"Design requirements for generating deceptive content to protect document repositories","author":"whitham","year":"2014","journal-title":"Proc 8th Austral Inf Warfare Secur Conf"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1162\/COLI_a_00107"},{"key":"ref58","first-page":"127","article-title":"Honey encryption for language-robbing Shannon to pay turing?","author":"beunardeau","year":"2016","journal-title":"Proc Int Conf Cryptol Malaysia"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1155\/2015\/406915"},{"year":"2019","journal-title":"Ludwigsburg","key":"ref56"},{"year":"2014","author":"mainguy","article-title":"Markov substitute processes: A statistical model for linguistics","key":"ref55"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1145\/3214305"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1109\/MIS.2018.2877277"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1007\/978-3-319-41187-3"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-642-25385-0_19"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"133","DOI":"10.46586\/tosc.v2018.i2.133-160","article-title":"Mixture differential cryptanalysis: A new approach to distinguishers and attacks on round-reduced AES","author":"grassi","year":"2018","journal-title":"IACR Trans Symmetric Cryptol Tech Rep"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1007\/s13389-016-0126-5"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.11591\/ijece.v9i3.pp1871-1878"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ACCESS.2019.2907261"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TETC.2016.2619669"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/MSP.2014.67"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-642-55220-5_17"},{"year":"2019","journal-title":"Most Popular Messaging Apps 2019","key":"ref17"},{"year":"2019","journal-title":"Whatsapp security","key":"ref18"},{"year":"2018","author":"paganini","journal-title":"A Security Issue in WhatsApp Potentially Allows Attackers to Eavesdrop on Encrypted Group Chats","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ACCESS.2018.2885458"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.ijcip.2017.10.004"},{"year":"2017","journal-title":"The Rise of Messaging Platforms","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/MIE.2017.2649104"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ACCESS.2018.2813432"},{"key":"ref7","first-page":"2184","article-title":"Honey chatting: A novel instant messaging system robust to eavesdropping over communication","author":"joo-im","year":"2016","journal-title":"Proc IEEE Int Conf Acoust Speech Signal Process (ICASSP)"},{"key":"ref49","first-page":"51","article-title":"Baiting inside attackers using decoy documents","author":"brian","year":"2009","journal-title":"Proc Int Conf Secur Privacy Commun Syst"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1155\/2016\/7093642"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/MC.2015.104"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/MSP.2017.3151339"},{"year":"2016","author":"mor","journal-title":"Honey-Faces Increasing the security and privacy of authentication using synthetic facial images","key":"ref48"},{"key":"ref47","first-page":"19","article-title":"Toward an insider threat detection framework using honey permissions","volume":"5","author":"kaghazgaran","year":"2019","journal-title":"J Internet Services Inf Secur"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/MSP.2017.3151345"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/TC.2017.2773524"},{"year":"2017","author":"mouna","article-title":"Secure hardware implementation of post quantum cryptosystems","key":"ref44"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1038\/nature23461"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08760227.pdf?arnumber=8760227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:33:02Z","timestamp":1641987182000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8760227\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2928359","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}