{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:48:04Z","timestamp":1756000084719,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/cybersecurity49315.2020.9138850","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T22:45:17Z","timestamp":1594680317000},"page":"1-11","source":"Crossref","is-referenced-by-count":2,"title":["Deep Down the Rabbit Hole: On References in Networks of Decoy Elements"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Reti","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Fraunholz","sequence":"additional","affiliation":[]},{"given":"Janis","family":"Zemitis","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Schneider","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Dieter Schotten","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.25046\/aj0203161"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890056"},{"article-title":"Inoculator and antibody for computer security","year":"2016","author":"hoglund","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264861"},{"key":"ref12","article-title":"Using deception to enhance security: A taxonomy, model, and novel uses","author":"almeshekah","year":"2015","journal-title":"Ph D Dissertation"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516671"},{"key":"ref14","article-title":"Honey sheets: What happens to leaked google spreadsheets?","author":"lazarov","year":"2016","journal-title":"9th Workshop on Cyber Security Experimentation and Test (CSET 16)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-991-5.ch013"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.733"},{"key":"ref17","article-title":"White paper: honeypot, honeynet, honeytoken: terminological issues","volume":"1275","author":"pouget","year":"2003","journal-title":"Rapport technique EURECOM"},{"key":"ref18","first-page":"17","article-title":"On the evolution of random graphs","volume":"5","author":"erd?s","year":"1960"},{"key":"ref19","article-title":"Reversibility and stochastic networks","volume":"76","author":"kelly","year":"1981","journal-title":"SERBIULA (sistema Librum 2 0)"},{"article-title":"Breaking honeypots for fun and profit","year":"2015","author":"sysman","key":"ref28"},{"article-title":"Cheating and Deception","year":"1991","author":"bell","key":"ref4"},{"key":"ref27","article-title":"Kippo SSH honeypot detector","author":"morris","year":"2018","journal-title":"MSF Module Rapid7 Vulnerability & Exploit Database"},{"key":"ref3","article-title":"A survey on honeypot software and data analysis","author":"nawrocki","year":"2016","journal-title":"Computing Research Repository"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CYCON.2014.6916397"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328709"},{"key":"ref5","article-title":"DLP and honeytokens","author":"de barros","year":"2007","journal-title":"Security Balance"},{"journal-title":"TopSpin Security Research Report","year":"0","author":"zohar","key":"ref8"},{"journal-title":"Forum of Incident Response and Security Teams","article-title":"Common vulnerability scoring system","year":"2018","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390365"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2011.5984063"},{"article-title":"Demystifying deception technology: A survey","year":"2018","author":"fraunholz","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2010.39"},{"key":"ref22","article-title":"Advanced honey pot identification and exploitation","volume":"x0b","author":"corey","year":"2005","journal-title":"Phrack"},{"key":"ref21","article-title":"Local honeypot identification","volume":"x0b","author":"corey","year":"2004","journal-title":"Phrack"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437807"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/801\/1\/012057"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495930"},{"key":"ref25","first-page":"131","article-title":"How to detect the cuckoo sandbox and hardening it?","author":"ferrand","year":"2013","journal-title":"22th EICAR Annual Conference"}],"event":{"name":"2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","start":{"date-parts":[[2020,6,15]]},"location":"Dublin, Ireland","end":{"date-parts":[[2020,6,19]]}},"container-title":["2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9136807\/9138848\/09138850.pdf?arnumber=9138850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:33:40Z","timestamp":1656344020000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9138850\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cybersecurity49315.2020.9138850","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}