{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T14:16:44Z","timestamp":1770646604521,"version":"3.49.0"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1544332"],"award-info":[{"award-number":["1544332"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/jproc.2017.2748421","type":"journal-article","created":{"date-parts":[[2017,9,26]],"date-time":"2017-09-26T18:19:16Z","timestamp":1506449956000},"page":"61-70","source":"Crossref","is-referenced-by-count":27,"title":["HoneyBot: A Honeypot for Robotic Systems"],"prefix":"10.1109","volume":"106","author":[{"given":"Celine","family":"Irvene","sequence":"first","affiliation":[]},{"given":"David","family":"Formby","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Litchfield","sequence":"additional","affiliation":[]},{"given":"Raheem","family":"Beyah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"5","article-title":"ROS: An open-source robot operating system","volume":"3","author":"quigley","year":"0","journal-title":"Proc Open-Source Softw Workshop Int Conf Robot Autom"},{"key":"ref38","first-page":"1","article-title":"Preliminary protocol for interoperable telesurgery","author":"king","year":"2009","journal-title":"Proc Int Conf Adv Robot"},{"key":"ref33","year":"2017"},{"key":"ref32","first-page":"177","article-title":"Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware","author":"chen","year":"2008","journal-title":"Proc IEEE Int Conf Dependable Syst Netw FTCS DCC"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495930"},{"key":"ref30","author":"morris","year":"2014","journal-title":"Detecting Kippo SSH Honeypots Bypassing Patches and All That Jazz"},{"key":"ref37","author":"nawrocki","year":"2016","journal-title":"A survey on honeypot software and data analysis"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2012.10.07"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2012.738375"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.38"},{"key":"ref10","author":"industries","year":"2016","journal-title":"GoPiGo"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA.2016.7558699"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2015.2412256"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7526486"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CEIT.2015.7233023"},{"key":"ref15","author":"lee","year":"2016","journal-title":"Potential Sample of Malware from the Ukrainian Cyber Attack Uncovered"},{"key":"ref16","year":"2016","journal-title":"Cyber-Attack Against Ukrainian Critical Infrastructure"},{"key":"ref17","author":"trahan","year":"2016","journal-title":"Industrial Control Systems Next Frontier for Cyber Attacks?"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.103"},{"key":"ref19","author":"foundation","year":"2016","journal-title":"Raspberry Pi"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2006.1652107"},{"key":"ref4","article-title":"To kill a centrifuge","author":"langner","year":"2013"},{"key":"ref27","year":"2017","journal-title":"Qebek"},{"key":"ref3","author":"kushner","year":"2013","journal-title":"The Real Story of Stuxnet"},{"key":"ref6","author":"t","year":"2015","journal-title":"Security Experts Hack Teleoperated Surgical Robot"},{"key":"ref29","year":"2017","journal-title":"Kippo&#x2013;SSH Honeypot"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2735960.2735980"},{"key":"ref8","author":"rist","year":"2013","journal-title":"The Conpot development team"},{"key":"ref7","author":"pothamsetty","year":"2004","journal-title":"SCADA honeynet project Building honeypots for industrial networks"},{"key":"ref2","author":"webzell","year":"2015","journal-title":"The rise of robotics"},{"key":"ref9","article-title":"The GasPot experiment: Unexamined perils in using gas-tank-monitoring systems","author":"wilhoit","year":"2015"},{"key":"ref1","year":"2016","journal-title":"Robot"},{"key":"ref20","year":"2014","journal-title":"Linearizing the Sharp IR Ranger With an Arduino"},{"key":"ref22","author":"cohen the risks digest","year":"1998","journal-title":"DTK Deception Toolkit"},{"key":"ref21","author":"goodrich live science","year":"2013","journal-title":"Accelerometers What They Are & How They Work"},{"key":"ref24","year":"2005","journal-title":"Wide-Angle Distance Measuring Sensor"},{"key":"ref23","author":"industries dexter industries","year":"2016","journal-title":"GrovePi"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437807"},{"key":"ref25","year":"2017","journal-title":"Sebek"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/5\/8232482\/8051259-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5\/8232482\/08051259.pdf?arnumber=8051259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:55:57Z","timestamp":1649444157000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8051259\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":39,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jproc.2017.2748421","relation":{},"ISSN":["0018-9219","1558-2256"],"issn-type":[{"value":"0018-9219","type":"print"},{"value":"1558-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]}}}