{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:52:40Z","timestamp":1774367560002,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883587","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T14:10:33Z","timestamp":1409753433000},"page":"1819-1824","source":"Crossref","is-referenced-by-count":15,"title":["Honeypots deployment for the analysis and visualization of malware activity and malicious connections"],"prefix":"10.1109","author":[{"given":"Ioannis","family":"Koniaris","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Papadimitriou","sequence":"additional","affiliation":[]},{"given":"Petros","family":"Nicopolitidis","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Obaidat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2009.5168026"},{"key":"18","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/11856214_9","article-title":"The nepenthes platform: An efficient approach to collect malware","author":"baecher","year":"2006","journal-title":"Recent Advances in Intrusion Detection (RAID)"},{"key":"15","author":"obied","year":"2006","journal-title":"Honeypots and Spam"},{"key":"16","first-page":"111","article-title":"Large-scale network monitoring for visual analysis of attacks","author":"fisher","year":"2008","journal-title":"Proceeding VizSec '08 Proceedings of the 5th International Workshop on Visualization for Computer Security"},{"key":"13","author":"spitzner","year":"2003","journal-title":"Honeypots Tracking Hackers"},{"key":"14","article-title":"Strategies and issues: Honeypots-sticking it to hackers","author":"spitzner","year":"2003","journal-title":"Network Magazine"},{"key":"11","article-title":"Observations of login activity in an ssh honeypot","year":"2009","journal-title":"Cisco Security Intelligence Operations"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254322"},{"key":"21","year":"0"},{"key":"20","year":"0"},{"key":"22","year":"0"},{"key":"23","article-title":"A virtual honeypot framework","author":"provos","year":"2004","journal-title":"Proceedings of the 13th conference on USENIX Security Symposium"},{"key":"24","author":"wicherski","year":"2006","journal-title":"Medium Interaction Honeypots"},{"key":"25","year":"0"},{"key":"26","year":"0"},{"key":"27","year":"2010","journal-title":"Conficker Working Group Lessons Learned"},{"key":"28","year":"0"},{"key":"29","year":"0"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130801"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511536700"},{"key":"10","article-title":"Analyzing malicious SSH login attempts","author":"seifert","year":"2006","journal-title":"Security Focus Infocus"},{"key":"1","year":"0"},{"key":"30","year":"0"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209211"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209209"},{"key":"5","article-title":"The influence model: A tractable representation for the dynamics networked markov chains","author":"asavathiratham","year":"1996","journal-title":"Massachusetts Institute of Technology"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1993.287647"},{"key":"9","author":"owens","year":"2008","journal-title":"A Study of Passwords and Methods Used in Brute-Force SSH Attacks"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.76"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","location":"Sydney, NSW","start":{"date-parts":[[2014,6,10]]},"end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883587.pdf?arnumber=6883587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T19:50:20Z","timestamp":1498161020000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883587\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883587","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}