{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T01:57:46Z","timestamp":1769738266126,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/inm.2011.5990710","type":"proceedings-article","created":{"date-parts":[[2011,8,25]],"date-time":"2011-08-25T15:57:47Z","timestamp":1314287867000},"page":"345-352","source":"Crossref","is-referenced-by-count":26,"title":["Adaptive and self-configurable honeypots"],"prefix":"10.1109","author":[{"given":"Gerard","family":"Wagener","sequence":"first","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Dulaunoy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/42411.42412"},{"key":"22","author":"tillmann","year":"0","journal-title":"Honeytrap"},{"key":"17","author":"love","year":"2005","journal-title":"Linux Kernel Development"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253575"},{"key":"18","author":"wagener","year":"0","journal-title":"AHA Source Code"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0060-x"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2001.953966"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/375360.375365"},{"key":"13","first-page":"825","article-title":"Fast concurrent reinforcement learners","author":"banerjee","year":"2001","journal-title":"Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence"},{"key":"14","first-page":"242","article-title":"Multiagent reinforcement learning: Theoretical framework and an algorithm","author":"hu","year":"1998","journal-title":"Proceedings of the Fifteenth International Conference on Machine Learning"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s10683-005-5374-7"},{"key":"12","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1613\/jair.301","article-title":"Reinforcement learning: A survey","volume":"4","author":"kaelbling","year":"1996","journal-title":"Journal of Artificial Intelligence Research"},{"key":"21","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/11856214_9","article-title":"The nepenthes platform: An efficient approach to collect malware","author":"baecher","year":"2006","journal-title":"Proc of 4th International Symposium on Recent Advances in Intrusion Detection (RAID)"},{"key":"3","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1007\/978-3-540-74320-0_11","article-title":"Out-of-the-box,\" monitoring of VM-based high-interaction honeypots","author":"jiang","year":"2007","journal-title":"RAID'07 Proceedings of the 10th International Conference on Recent Advances in Intrusion Detection"},{"key":"20","first-page":"1","article-title":"There be dragons","author":"bellovin","year":"1992","journal-title":"Proceedings of the Third USENIX UNIX Security Symposium"},{"key":"2","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1007\/978-3-642-05118-0_51","article-title":"Self adaptive high interaction honeypots driven by game theory","volume":"5873","author":"wagener","year":"2009","journal-title":"Series in Lecture Notes in Computer Science"},{"key":"1","author":"spitzner","year":"2002","journal-title":"Honeypots Tracking Hackers"},{"key":"10","author":"greenwald","year":"2007","journal-title":"Matrix games and nash equilibrium"},{"key":"7","author":"dike","year":"2006","journal-title":"User Mode Linux"},{"key":"6","author":"sutton","year":"1998","journal-title":"Reinforcement Learning An Introduction (Adaptive Computation and Machine Learning)"},{"key":"5","first-page":"13","article-title":"Paranoid penguin: An introduction to novell AppArmor","volume":"2006","author":"bauer","year":"2006","journal-title":"Linux Journal"},{"key":"4","author":"smalley","year":"2001","journal-title":"Implementing SELinux as a Linux Security Module"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2006.17"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.76"}],"event":{"name":"2011 IFIP\/IEEE International Symposium on Integrated Network Management (IM 2011)","location":"Dublin, Ireland","start":{"date-parts":[[2011,5,23]]},"end":{"date-parts":[[2011,5,27]]}},"container-title":["12th IFIP\/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5976317\/5990489\/05990710.pdf?arnumber=5990710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T11:57:17Z","timestamp":1560513437000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5990710\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/inm.2011.5990710","relation":{},"subject":[],"published":{"date-parts":[[2011,5]]}}}