{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:15:00Z","timestamp":1775470500351,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-21-1-0171,H98230-20-1-0392"],"award-info":[{"award-number":["H98230-21-1-0171,H98230-20-1-0392"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF2110188"],"award-info":[{"award-number":["W911NF2110188"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679421","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"379-386","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating Few-Shot Learning Generative Honeypots in A Live Deployment"],"prefix":"10.1109","author":[{"given":"Jarrod","family":"Ragsdale","sequence":"first","affiliation":[{"name":"University of Texas at San Antonio,Department of Computer Science,San Antonio,Texas,78249-4871"}]},{"given":"Rajendra","family":"Boppana","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio,Department of Computer Science,San Antonio,Texas,78249-4871"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106669"},{"key":"ref2","article-title":"Attention is all you need","author":"Vaswani","year":"2017","journal-title":"Advances in neural information processing systems 30"},{"key":"ref3","first-page":"2152","article-title":"An embarrassingly simple approach to zero-shot learning","volume-title":"International conference on machine learning","author":"Romera-Paredes"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196537"},{"key":"ref5","first-page":"27730","article-title":"Training language models to follow instructions with human feedback","volume":"35","author":"Ouyang","year":"2022","journal-title":"Advances in neural information processing systems"},{"key":"ref6","first-page":"1","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21.140","author":"Raffel","year":"2020","journal-title":"Journal of machine learning research"},{"key":"ref7","article-title":"Chatbots in a honeypot world","author":"McKee","year":"2023","journal-title":"arXiv preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3326104"},{"key":"ref9","article-title":"Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and Resources","author":"Cambiaso","year":"2023","journal-title":"arXiv preprint"},{"key":"ref10","article-title":"LLMPot: Automated LLM-based Industrial Protocol and Physical Process Emulation for ICS Honeypots","author":"Vasilatos","year":"2024","journal-title":"arXiv preprint"},{"key":"ref11","volume-title":"Mitre ATT&CK","year":"2024"},{"key":"ref12","volume-title":"Cowrie SSH\/Telnet Honeypot","year":"2024"},{"key":"ref13","volume-title":"Datasets Used for Research on Evaluating Few-Shot Learning Generative Honeypots in a Live Deployment. Version V1","author":"Ragsdale","year":"2024"},{"key":"ref14","volume-title":"Honeypots: tracking hackers","volume":"1","author":"Spitzner","year":"2003"},{"key":"ref15","volume-title":"Deception ToolKit","author":"Cohen","year":"1998"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1233341.1233399"},{"key":"ref17","first-page":"23","article-title":"Comparative study of different honeypots system","author":"Girdhar","year":"2012","journal-title":"International Journal of Engineering Research and Development e-ISSN"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IntelliSys.2015.7361266"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CANDARW53999.2021.00074"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC56721.2023.10293827"},{"key":"ref21","article-title":"LLM in the shell: Generative honeypots","author":"Sladi\u0107","year":"2023","journal-title":"arXiv preprint"},{"key":"ref22","article-title":"HoneyGPT: Breaking the Trilemma in Terminal Honeypots with Large Language Model","volume":"01882","author":"Wang","year":"2024","journal-title":"arXiv preprint"},{"key":"ref23","article-title":"NL2CMD: An Updated Workflow for Natural Language to Bash Commands Translation","author":"Fu","year":"2023","journal-title":"arXiv preprint"},{"key":"ref24","volume-title":"Search Engine for the Internet of Everything","year":"2024"},{"key":"ref25","first-page":"1","article-title":"Iotcandyjar: Towards an intelligent- interaction honeypot for iot devices","volume":"1","author":"Luo","year":"2017","journal-title":"Black Hat"},{"key":"ref26","first-page":"1627","article-title":"Inadvertently making cyber criminals rich: A comprehensive study of cryptojacking campaigns at internet scale","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Bijmans"},{"key":"ref27","article-title":"Cascadebert: Accelerating inference of pretrained language models via calibrated complete models cascade","author":"Li","year":"2020","journal-title":"arXiv preprint"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679421.pdf?arnumber=10679421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T04:58:34Z","timestamp":1727240314000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679421","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}