{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:18:01Z","timestamp":1771467481050,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,3]]},"DOI":"10.1109\/comsnets59351.2024.10426938","type":"proceedings-article","created":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T18:55:32Z","timestamp":1708109732000},"page":"13-18","source":"Crossref","is-referenced-by-count":2,"title":["Generation of Believable Fake Logic Circuits for Cyber Deception"],"prefix":"10.1109","author":[{"given":"Nilin","family":"Prabhaker","sequence":"first","affiliation":[{"name":"National Institute of Technology,Tiruchirappalli,India,620015"}]},{"given":"Ghanshyam S.","family":"Bopche","sequence":"additional","affiliation":[{"name":"National Institute of Technology,Tiruchirappalli,India,620015"}]},{"given":"Abhijit","family":"Mishra","sequence":"additional","affiliation":[{"name":"National Institute of Technology,Tiruchirappalli,India,620015"}]},{"given":"Michael","family":"Arock","sequence":"additional","affiliation":[{"name":"National Institute of Technology,Tiruchirappalli,India,620015"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Ip commission report","author":"Blair","year":"2017"},{"issue":"4","key":"ref2","first-page":"6","article-title":"Investigating zero-day attacks","volume":"38","author":"Bilge","year":"2013","journal-title":"Login"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2898661"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2018.2877277"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3058994"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/287"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3038132"},{"key":"ref8","volume-title":"What is intellectual property?"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630330104"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/69.649313"},{"issue":"3","key":"ref11","first-page":"127","article-title":"Military deception and strategic culture","volume":"20","author":"Morrell","year":"2021","journal-title":"Journal of Information Warfare"},{"key":"ref12","volume-title":"Ukraine lures russian missiles with decoy of u.s. rocket system","author":"Post","year":"2023"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2021.1896786"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193207"},{"key":"ref15","volume-title":"Honeypots: tracking hackers","volume":"1","year":"2003"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2535813.2535824"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2018.2877277"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2011.06.002"},{"key":"ref19","volume-title":"An improved tarpit for network deception","author":"Shing","year":"2016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660329"},{"key":"ref21","article-title":"A framework for intrusion deception on web servers","volume-title":"2013 International Conference on Internet Computing, ICOMP13","author":"Katsinis","year":"2013"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987475"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516671"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.findings-emnlp.486"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437806"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05284-2_4"},{"issue":"1","key":"ref27","first-page":"103","article-title":"Automating the generation of fake documents to detect network intruders","volume":"2","author":"Whitham","year":"2013","journal-title":"International Journal of Cyber-Security and Digital Forensics"},{"issue":"2","key":"ref28","first-page":"27","article-title":"Two taxonomies of deception for attacks on information systems","volume":"3","author":"Rowe","year":"2004","journal-title":"Journal of Information Warfare"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.20"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.733"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3418289"},{"key":"ref32","volume-title":"Bed to 7 segment decoder","author":"Katiyar","year":"2023"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1134\/S1054661819020068"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0020-2_36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/NCVPRIPG.2015.7490040"},{"key":"ref36","volume-title":"Boolean.py","author":"Kraemer","year":"2022"},{"key":"ref37","article-title":"Programing implementation of the quine-mccluskey method for minimization of boolean expression","author":"Huang","year":"2014","journal-title":"arXiv preprint"},{"key":"ref38","volume-title":"Logisim a graphical tool for designing and simulating digital logic circuits version 2.7.1","author":"Burch","year":"2011"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1986.1586072"},{"key":"ref40","volume-title":"Circuitverse online digital logic circuit simulator","year":"2023"}],"event":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","location":"Bengaluru, India","start":{"date-parts":[[2024,1,3]]},"end":{"date-parts":[[2024,1,7]]}},"container-title":["2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426746\/10426785\/10426938.pdf?arnumber=10426938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T01:54:03Z","timestamp":1710381243000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10426938\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,3]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/comsnets59351.2024.10426938","relation":{},"subject":[],"published":{"date-parts":[[2024,1,3]]}}}