{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:11:37Z","timestamp":1755216697051,"version":"3.43.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/cybersecpods.2018.8560675","type":"proceedings-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T20:24:46Z","timestamp":1544127886000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Fraunholz","sequence":"first","affiliation":[{"name":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence, Kaiserslautern, Germany"}]},{"given":"Daniel","family":"Krohmer","sequence":"additional","affiliation":[{"name":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence, Kaiserslautern, Germany"}]},{"given":"Hans Dieter","family":"Schotten","sequence":"additional","affiliation":[{"name":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence, Kaiserslautern, Germany"}]},{"given":"Carolina","family":"Nogueira","sequence":"additional","affiliation":[{"name":"Distributed Computer Systems Lab, University of Kaiserslautern, Kaiserslautern, Germany"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217938"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664252"},{"journal-title":"Volatility framework - volatile memory extraction utility framework","year":"2018","key":"ref12"},{"journal-title":"Honeynet Project","year":"2003","key":"ref13"},{"journal-title":"Know Your Tools Qebek-Conceal the Monitoring","year":"2010","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/SOFTCOM.2017.8115550"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.22619\/IJCSA.2017.100113"},{"key":"ref17","article-title":"A question of context: Enhancing intrusion detection by providing context information","volume":"13","author":"duque anton","year":"2017","journal-title":"Prodeedings of the Conference of Telecommunication Media and Internet Techno-Economics"},{"journal-title":"QEMU-Team","year":"2016","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2017.8074855"},{"key":"ref28","article-title":"Accurate and efficient exploit capture and classification","author":"ding","year":"2015","journal-title":"Science China Information Science"},{"key":"ref4","article-title":"Two decades of scada exploitation: A brief history","volume":"3","author":"duque anton","year":"2017","journal-title":"Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2422261"},{"journal-title":"The Future of Cybercrime & Security Financial & Corporate Threats & Mitigation 2015&#x2013;2020","year":"2015","key":"ref3"},{"key":"ref6","article-title":"A survey on honeypot software and data analysis","author":"nawrocki","year":"2016","journal-title":"CoRR"},{"key":"ref29","article-title":"Towards basic design principles for high-and medium-interaction honeypots","volume":"16","author":"fraunholz","year":"2017","journal-title":"13th European Conference on Cyber Warfare and Security"},{"journal-title":"Riding the deception wave","year":"2016","author":"levy","key":"ref5"},{"journal-title":"Honeynet Project","year":"2014","key":"ref8"},{"journal-title":"The Cuckoo's Egg Tracking a Spy Through the Maze of Computer Espionage","year":"1990","author":"stoll","key":"ref7"},{"journal-title":"2015 Internet Crime Report","year":"2015","key":"ref2"},{"journal-title":"Honssh","year":"2016","author":"nicholson","key":"ref9"},{"journal-title":"Internet organized crime threat assessment","year":"2016","key":"ref1"},{"journal-title":"Empirical studies based on empirical studies based on honeypots for characterizing attackers behavior","year":"2015","author":"sobesto","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.92"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2017.7943186"},{"journal-title":"Mirai-Source-Code","year":"2016","key":"ref24"},{"key":"ref23","article-title":"Deception in information security: Legal considerations in the context of german and european law","volume":"10","author":"fraunholz","year":"2017","journal-title":"Intemationsal Symposium on Foundations and Practice of Security"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39639-2_6"},{"journal-title":"Hajime Analysis of a Decentralized Internet Worm for IoT Devices","year":"0","author":"edwards","key":"ref25"}],"event":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","start":{"date-parts":[[2018,6,11]]},"location":"Glasgow, UK","end":{"date-parts":[[2018,6,12]]}},"container-title":["2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537418\/8560662\/08560675.pdf?arnumber=8560675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T18:39:37Z","timestamp":1754332777000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8560675\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cybersecpods.2018.8560675","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}