{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:30:58Z","timestamp":1775838658561,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1109\/lcn58197.2023.10223347","type":"proceedings-article","created":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T17:26:17Z","timestamp":1694021177000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["A Ship Honeynet to Gather Cyber Threat Intelligence for the Maritime Sector"],"prefix":"10.1109","author":[{"given":"Jeroen","family":"Pijpker","sequence":"first","affiliation":[{"name":"NHL Stenden University of Applied Sciences,Maritime IT Security Research Group,Emmen,Netherlands"}]},{"given":"Stephen James","family":"McCombie","sequence":"additional","affiliation":[{"name":"NHL Stenden University of Applied Sciences,Maritime IT Security Research Group,Leeuwarden,Netherlands"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Honeypots: tracking hackers","author":"spitzner","year":"2003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1063\/1.2810663"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/jcp1020013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102288"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.2002.1013842"},{"key":"ref31","first-page":"12","article-title":"A Report on the Security of Home Connections with IoT and Docker Honeypots","author":"bistarelli","year":"0"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2017.20"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/42411.42412"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.12716\/1001.15.03.04"},{"key":"ref10","first-page":"11","article-title":"IoTCandyJar: Towards an Intelligent-Interaction Honeypot for IoT Devices","author":"luo","year":"0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-150"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.240"},{"key":"ref1","first-page":"81","article-title":"A Ship Honeynet Project to Collect Data on Cyber Threats to the Maritime Sector","author":"mccombie","year":"0","journal-title":"presented at the CYBER 2022 The Seventh International Conference on Cyber-Technologies and Cyber-Systems"},{"key":"ref17","article-title":"NotPetya ransomware attack cost shipping giant Maersk over $200 million","volume":"16","author":"mathews","year":"2017","journal-title":"Forbes Aug"},{"key":"ref16","article-title":"Shen attack: Cyber risk in asia pacific ports","author":"daffron","year":"2019","journal-title":"Cent Risk Stud"},{"key":"ref19","article-title":"The Guidelines on Cyber Security Onboard Ships","volume":"4","year":"2017","journal-title":"BIMCO"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/jmse7100350"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101589"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.001"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon51939.2021.9468289"},{"key":"ref25","article-title":"Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives","author":"sauerwein","year":"2017","journal-title":"Wirtsch 2017 Proc"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.12716\/1001.15.01.02"},{"key":"ref22","article-title":"CVE - CVE-2018-5071","year":"2023"},{"key":"ref21","article-title":"Ship Honeynet Student Project","author":"rijnierse","year":"2022"},{"key":"ref28","article-title":"Technical Report &#x2013; ISIF ASIA","year":"2023"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IACC48062.2019.8971584"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2018.8635778"},{"key":"ref8","article-title":"Researchers at NHL Stenden launch database that exposes cyber hacking in the worldwide maritime industry NHL Stenden university of applied sciences","year":"2023"},{"key":"ref7","article-title":"Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries","year":"2023","journal-title":"Mandiant"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106669"},{"key":"ref4","article-title":"Threats and Impacts in Maritime Cyber Security","volume":"1","author":"tam","year":"2016","journal-title":"Eng Technol Ref"},{"key":"ref3","article-title":"Raising the Colors: Signaling for Cooperation on Maritime Cybersecurity","author":"loomis","year":"0"},{"key":"ref6","article-title":"Maritime cybersecurity: a guide for leaders and managers","author":"kessler","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2018.1513053"}],"event":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","location":"Daytona Beach, FL, USA","start":{"date-parts":[[2023,10,2]]},"end":{"date-parts":[[2023,10,5]]}},"container-title":["2023 IEEE 48th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10223299\/10223313\/10223347.pdf?arnumber=10223347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T15:43:18Z","timestamp":1694792598000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10223347\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,2]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/lcn58197.2023.10223347","relation":{},"subject":[],"published":{"date-parts":[[2023,10,2]]}}}