{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:53:01Z","timestamp":1774367581377,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/eurocon.2013.6624967","type":"proceedings-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T17:48:16Z","timestamp":1382032096000},"page":"65-72","source":"Crossref","is-referenced-by-count":39,"title":["Analysis and visualization of SSH attacks using honeypots"],"prefix":"10.1109","author":[{"given":"Ioannis","family":"Koniaris","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Papadimitriou","sequence":"additional","affiliation":[]},{"given":"Petros","family":"Nicopolitidis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0","journal-title":"Kippo Honeypot"},{"key":"22","year":"0"},{"key":"17","year":"0"},{"key":"23","year":"0"},{"key":"18","article-title":"The secure shell (SSH) connection protocol","author":"ylonen","year":"2006","journal-title":"Internet Engineering Task Force RFC 4254"},{"key":"24","year":"0"},{"key":"15","author":"blasco","year":"2008","journal-title":"An Approach to Malware Collection Log Visualization"},{"key":"16","year":"0"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2009.5168026"},{"key":"14","author":"baecher","year":"2006","journal-title":"The Nepenthes Platform An Efficient Approach to Collect Malware"},{"key":"11","article-title":"Analyzing malicious SSH login attempts","author":"seifert","year":"2006","journal-title":"Security Focus Infocus 1876"},{"key":"12","author":"fisher","year":"2008","journal-title":"Large-scale Network Monitoring for Visual Analysis of Attacks"},{"key":"21","year":"0"},{"key":"3","article-title":"Strategies and issues: Honeypots - Sticking it to hackers","author":"spitzner","year":"2003","journal-title":"Network Magazine"},{"key":"20","year":"0"},{"key":"2","author":"spitzner","year":"2003","journal-title":"Honeypots Tracking Hackers"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254322"},{"key":"10","first-page":"4","article-title":"Using kojoney open source low interaction honeypot to develop defensive strategies and fingerprint post compromise attacker behavior","volume":"1","author":"klein keane","year":"2010","journal-title":"HITB Magazine"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.76"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2006.17"},{"key":"5","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1007\/978-3-540-71080-6_6","article-title":"Visual analytics: Scope and challenges","author":"keim","year":"2008","journal-title":"Visual Data Mining"},{"key":"4","author":"obied","year":"2007","journal-title":"Honeypots and Spam"},{"key":"9","article-title":"Observations of login activity in an SSH honeypot","year":"2009","journal-title":"Cisco Security Intelligence Operations"},{"key":"8","author":"owens","year":"2008","journal-title":"A Study of Passwords and Methods Used in Brute-Force SSH Attacks"}],"event":{"name":"IEEE EUROCON 2013","location":"Zagreb, Croatia","start":{"date-parts":[[2013,7,1]]},"end":{"date-parts":[[2013,7,4]]}},"container-title":["Eurocon 2013"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596534\/6624951\/06624967.pdf?arnumber=6624967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T19:35:19Z","timestamp":1564515319000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6624967\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/eurocon.2013.6624967","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}