{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:29:56Z","timestamp":1761676196899,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/infcomw.2014.6849288","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T11:47:23Z","timestamp":1406634443000},"page":"535-540","source":"Crossref","is-referenced-by-count":7,"title":["Active deception model for securing cloud infrastructure"],"prefix":"10.1109","author":[{"given":"Albert","family":"Brzeczko","sequence":"first","affiliation":[]},{"given":"A. Selcuk","family":"Uluagac","sequence":"additional","affiliation":[]},{"given":"Raheem","family":"Beyah","sequence":"additional","affiliation":[]},{"given":"John","family":"Copeland","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2009.218"},{"year":"0","key":"22"},{"journal-title":"Modelling the Costs and Benefits of Honeynets","year":"2004","author":"dornseif","key":"17"},{"year":"0","key":"23"},{"key":"18","first-page":"139","article-title":"Botminer: Clustering analysis of network traffic for protocol-And structureindependent botnet detection","author":"gu","year":"2008","journal-title":"Proceedings of the 17th Conference on Security Symposium ser"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1093\/sysbio\/45.3.380"},{"key":"15","volume":"1","author":"spitzner","year":"2003","journal-title":"Honeypots Tracking Hackers"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193207"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68768-1_2"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.012"},{"year":"0","key":"11"},{"journal-title":"Software Defined Perimeter","year":"2013","author":"boehme","key":"12"},{"year":"0","key":"21"},{"key":"3","first-page":"2010","volume":"20","author":"chen","year":"2010","journal-title":"What's New about Cloud Computing Security"},{"year":"0","key":"20"},{"journal-title":"Gartner Says the Road to Increased Enterprise Cloud Usage Will Largely Run Through Tactical Business Solutions Addressing Specific Issues","year":"0","author":"rivera","key":"2"},{"key":"1","first-page":"2","article-title":"Cloud computing for parallel scientific hpc applications: Feasibility of running coupled atmosphere-ocean climate models on amazon's ec2","volume":"2","author":"evangelinos","year":"2008","journal-title":"Rational"},{"year":"0","key":"10"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"IEEE INFOCOM 2014 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","start":{"date-parts":[[2014,4,27]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,5,2]]}},"container-title":["2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6841218\/6849127\/06849288.pdf?arnumber=6849288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T14:08:49Z","timestamp":1490278129000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6849288\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/infcomw.2014.6849288","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}