{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:06:57Z","timestamp":1764688017822,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,27]]},"DOI":"10.1109\/csr54599.2022.9850329","type":"proceedings-article","created":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T19:35:46Z","timestamp":1660678546000},"page":"345-350","source":"Crossref","is-referenced-by-count":10,"title":["Protecting IEC 60870-5-104 ICS\/SCADA Systems with Honeypots"],"prefix":"10.1109","author":[{"given":"Elisavet","family":"Grigoriou","sequence":"first","affiliation":[{"name":"Sidroco Holdings Ltd,Nicosia,Cyprus"}]},{"given":"Athanasios","family":"Liatifis","sequence":"additional","affiliation":[{"name":"University of Western Macedonia,Kozani,Greece"}]},{"given":"Panagiotis Radoglou","family":"Grammatikis","sequence":"additional","affiliation":[{"name":"University of Western Macedonia,Kozani,Greece"}]},{"given":"Thomas","family":"Lagkas","sequence":"additional","affiliation":[{"name":"International Hellenic University,Kavala,Greece"}]},{"given":"Ioannis","family":"Moscholios","sequence":"additional","affiliation":[{"name":"University of Peloponnese,Greece"}]},{"given":"Evangelos","family":"Markakis","sequence":"additional","affiliation":[{"name":"Hellenic Mediterranean University,Greece"}]},{"given":"Panagiotis","family":"Sarigiannidis","sequence":"additional","affiliation":[{"name":"University of Western Macedonia,Kozani,Greece"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423356"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500567"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2017.8340689"},{"key":"ref13","first-page":"436","article-title":"Improving exposure of intrusion deception system through implementation of hybrid honeypot","volume":"9","author":"mansoori","year":"2012","journal-title":"The International Arab Journal of Information Technology"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC.2019.8729425"},{"key":"ref15","first-page":"62","article-title":"Honeypots for network security","volume":"7","author":"karthikeyan","year":"2017","journal-title":"International Journal for Research & Development in Technology"},{"key":"ref16","article-title":"Medium interaction honeypots","author":"wicherski","year":"2006","journal-title":"German Honeynet Project"},{"key":"ref17","article-title":"Comparison of network security tools-firewall, intrusion detection system and honeypot","volume":"200204","author":"kaur","year":"2014","journal-title":"Int J Enhanced Res Sci Technol Eng"},{"article-title":"World wide ics honeypots: A study into the deployment of conpot honeypots","year":"2021","author":"maesschalck","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888409"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56538-5_13"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.04.005"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2019.8913891"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CITSM50537.2020.9268794"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2022.3184112"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527936"},{"article-title":"A survey on honeypot software and data analysis","year":"2016","author":"nawrocki","key":"ref2"},{"key":"ref9","first-page":"300","article-title":"Dipot: A distributed industrial honeypot system","author":"cao","year":"2017","journal-title":"International Conference on Smart Computing and Communication"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106669"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI49370.2019.00035"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.47175\/rissj.v2i1.209"},{"key":"ref21","first-page":"1","article-title":"Container-based honeypot deployment for the analysis of malicious activity","author":"kyriakou","year":"2018","journal-title":"2018 Global Information Infrastructure and Networking Symposium (GIIS)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MOCAST49295.2020.9200285"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31328-9_9"},{"key":"ref26","article-title":"Description and analysis of iec 104 protocol","author":"matou\u0161ek","year":"2017","journal-title":"Faculty of Information Technology Brno University o Technology Tech Rep"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"100433","DOI":"10.1016\/j.ijcip.2021.100433","article-title":"Architecture and security of scada systems: A review","volume":"34","author":"yadav","year":"2021","journal-title":"International Journal of Critical Infrastructure Protection"}],"event":{"name":"2022 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2022,7,27]]},"location":"Rhodes, Greece","end":{"date-parts":[[2022,7,29]]}},"container-title":["2022 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9850275\/9850277\/09850329.pdf?arnumber=9850329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:23:22Z","timestamp":1662409402000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9850329\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,27]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/csr54599.2022.9850329","relation":{},"subject":[],"published":{"date-parts":[[2022,7,27]]}}}