{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:46:04Z","timestamp":1769849164624,"version":"3.49.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"23","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFB2904004"],"award-info":[{"award-number":["2023YFB2904004"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFB2904000"],"award-info":[{"award-number":["2023YFB2904000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangsu Key Development Planning Project","award":["BE2023004-2"],"award-info":[{"award-number":["BE2023004-2"]}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["20KJA520001"],"award-info":[{"award-number":["20KJA520001"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"14th Five-Year Plan Project of Equipment Development Department","award":["315107402"],"award-info":[{"award-number":["315107402"]}]},{"DOI":"10.13039\/501100013993","name":"Wuxi University Research Start-Up Fund for High-Level Talents","doi-asserted-by":"publisher","award":["550225097"],"award-info":[{"award-number":["550225097"]}],"id":[{"id":"10.13039\/501100013993","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,12,1]]},"DOI":"10.1109\/jiot.2025.3609800","type":"journal-article","created":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T17:35:04Z","timestamp":1758044104000},"page":"50262-50278","source":"Crossref","is-referenced-by-count":1,"title":["A Mimic Honeypot Construction Method Based on Incomplete Information Zero-Sum Stochastic Games and Q-Learning"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9026-0133","authenticated-orcid":false,"given":"Sisi","family":"Shao","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Wuxi University, Wuxi, China"}]},{"given":"Zongkai","family":"Ji","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"given":"Xukun","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Automation, the Institute of High Performance Computing and Bigdata and Jiangsu HPC and Intelligent Processing Engineer Research Center, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5498-4947","authenticated-orcid":false,"given":"Fei","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Automation, the Institute of High Performance Computing and Bigdata and Jiangsu HPC and Intelligent Processing Engineer Research Center, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8511-7544","authenticated-orcid":false,"given":"Shangdong","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Automation, the Institute of High Performance Computing and Bigdata and Jiangsu HPC and Intelligent Processing Engineer Research Center, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7019-3942","authenticated-orcid":false,"given":"Yimu","family":"Ji","sequence":"additional","affiliation":[{"name":"School of Automation, the Institute of High Performance Computing and Bigdata and Jiangsu HPC and Intelligent Processing Engineer Research Center, Nanjing University of Posts and Telecommunications, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1127","article-title":"Examining the efficacy of decoy-based and psychological cyber deception","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Ferguson-Walter"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700616"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417231"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103792"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103268"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3368072"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3288942"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.126"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102288"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3044576"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3420023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103719"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3071513"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3080527"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2021.05.015"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-021-3379-2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-022-3635-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.07.006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102661"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3275986"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-023-09689-4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3617184.3618056"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.12.001"},{"issue":"1","key":"ref24","first-page":"170","article-title":"Improving replicator dynamic evolutionary game model for selecting optimal defense strategies","volume":"39","author":"Huang","year":"2018","journal-title":"J. Commun."},{"issue":"5","key":"ref25","first-page":"942","article-title":"Network defense decision method based on random game theory and improved WoLF PHC","volume":"6","author":"Yang","year":"2019","journal-title":"J. Comput. Res. Develop."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2020.3023447"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3102874"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2024.3448407"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3318942"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI50451.2021.9660066"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2547994"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109534"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621210"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-50670-3_10"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-016-1140-2"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101870"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3220537"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2297"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/math12101508"},{"key":"ref40","first-page":"113","article-title":"A dynamic deceptive honeynet system with a hybrid of virtual and real devices","volume-title":"Proc. 5th Int. Conf. Comput. Big Data","author":"Zheng"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/6GIoTT57212.2022.00014"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11261327\/11164943.pdf?arnumber=11164943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:44:47Z","timestamp":1763664287000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11164943\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,1]]},"references-count":41,"journal-issue":{"issue":"23"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3609800","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,1]]}}}