{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:25:08Z","timestamp":1773156308029,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T00:00:00Z","timestamp":1611705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T00:00:00Z","timestamp":1611705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T00:00:00Z","timestamp":1611705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1739032"],"award-info":[{"award-number":["1739032"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,27]]},"DOI":"10.1109\/ccwc51732.2021.9376038","type":"proceedings-article","created":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T20:17:39Z","timestamp":1616012259000},"page":"0766-0772","source":"Crossref","is-referenced-by-count":17,"title":["Correlation of Cyber Threat Intelligence Data Across Global Honeypots"],"prefix":"10.1109","author":[{"given":"Jay","family":"Thom","sequence":"first","affiliation":[]},{"given":"Yash","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Shamik","family":"Sengupta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"mccaughey","year":"2017","journal-title":"Deception using an ssh honeypot"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2017.8074855"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INCIT.2019.8912060"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON.2013.6624967"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170867"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.22619\/IJCSA.2017.100113"},{"key":"ref16","author":"pittman","year":"2020","journal-title":"Primer&#x2013;a tool for testing honeypot measures of effectiveness"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00049"},{"key":"ref18","article-title":"Bitter harvest: systematically fingerprinting low- and medium-interaction honeypots at internet scale","author":"vetterl","year":"0","journal-title":"12th USENIX Workshop on Offensive Technologies (WOOT 18)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.11610\/isij.4320"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2762161"},{"key":"ref3","article-title":"Network probe patterns against a honeynet in Malaysia","volume":"8","author":"memari","year":"2015","journal-title":"Science and Technology Research Institute for Defence"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IACC48062.2019.8971584"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AITC.2019.8921162"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2018.8635778"},{"key":"ref7","author":"nawrocki","year":"2016","journal-title":"A survey on honeypot software and data analysis"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599742"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI49370.2019.00035"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031234"},{"key":"ref20","article-title":"A report on the security of home connections with IoT and Docker honeypots","author":"bistarelli","year":"0","journal-title":"ITASEC"},{"key":"ref22","article-title":"HTTPD, the Apache http server project","year":"2020","journal-title":"Docker hub"},{"key":"ref21","article-title":"Rayson Cowrie","year":"2020","journal-title":"Docker hub"},{"key":"ref24","year":"2016","journal-title":"Linux Took Over the Web Now It's Taking Over the World"},{"key":"ref23","year":"2020","journal-title":"Stillard Pure FTPD"},{"key":"ref26","year":"2020","journal-title":"VPNs and Data Center IPs"},{"key":"ref25","article-title":"Eclipse 2018 survey: The IoT landscape, what it empirically looks like","year":"2018","journal-title":"Canonical Ubuntu Blog"}],"event":{"name":"2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC)","location":"NV, USA","start":{"date-parts":[[2021,1,27]]},"end":{"date-parts":[[2021,1,30]]}},"container-title":["2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9375825\/9375905\/09376038.pdf?arnumber=9376038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:43:11Z","timestamp":1652197391000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9376038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,27]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ccwc51732.2021.9376038","relation":{},"subject":[],"published":{"date-parts":[[2021,1,27]]}}}