{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:16:37Z","timestamp":1762377397906,"version":"3.37.3"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012389","name":"National Institute of Information and Communications Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012389","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100009105","name":"Ministry of Internal Affairs and Communications","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100009105","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,11]]},"DOI":"10.1109\/isdfs58141.2023.10131856","type":"proceedings-article","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T17:30:36Z","timestamp":1685122236000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Who are you? OSINT-based Profiling of Infrastructure Honeypot Visitors"],"prefix":"10.1109","author":[{"given":"Takayuki","family":"Sasaki","sequence":"first","affiliation":[{"name":"Yokohama National University"}]},{"given":"Katsunari","family":"Yoshioka","sequence":"additional","affiliation":[{"name":"Yokohama National University"}]},{"given":"Tsutomu","family":"Matsumoto","sequence":"additional","affiliation":[{"name":"Yokohama National University"}]}],"member":"263","reference":[{"year":"0","key":"ref13","article-title":"telnet linux command man page"},{"year":"1983","key":"ref12","article-title":"RFC854, TELNET PROTOCOL SPECIFICATION"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-23020-2_9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.48"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_22"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(01)02017-6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833730"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2172\/1505628"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98385-1_15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1485"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23163"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.76"},{"article-title":"Understanding internet of things malware by analyzing endpoints in their static artifacts","year":"2021","author":"anwar","key":"ref7"},{"year":"0","key":"ref9","article-title":"Tor project"},{"year":"2020","key":"ref4","article-title":"Advanced persistent threat groups"},{"year":"2020","key":"ref3","article-title":"Groups"},{"key":"ref6","article-title":"Schr&#x00F6;inger&#x2019;s RAT: Profiling the stakeholders in the remote access trojan ecosystem","author":"rezaeirad","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"year":"2023","key":"ref5","article-title":"Crowdstrike 2023 global threat report"}],"event":{"name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","start":{"date-parts":[[2023,5,11]]},"location":"Chattanooga, TN, USA","end":{"date-parts":[[2023,5,12]]}},"container-title":["2023 11th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10131120\/10131673\/10131856.pdf?arnumber=10131856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T17:45:46Z","timestamp":1687196746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10131856\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/isdfs58141.2023.10131856","relation":{},"subject":[],"published":{"date-parts":[[2023,5,11]]}}}