{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:03Z","timestamp":1767340083160,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/milcom.2018.8599755","type":"proceedings-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T23:10:39Z","timestamp":1546557039000},"page":"110-115","source":"Crossref","is-referenced-by-count":14,"title":["On Defensive Cyber Deception: A Case Study Using SDN"],"prefix":"10.1109","author":[{"given":"Cho-Yu J.","family":"Chiang","sequence":"first","affiliation":[]},{"given":"Sridhar","family":"Venkatesan","sequence":"additional","affiliation":[]},{"given":"Shridatt","family":"Sugrim","sequence":"additional","affiliation":[]},{"given":"Jason A.","family":"Youzwak","sequence":"additional","affiliation":[]},{"given":"Ritu","family":"Chadha","sequence":"additional","affiliation":[]},{"given":"Edward I.","family":"Colbert","sequence":"additional","affiliation":[]},{"given":"Hasan","family":"Cam","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"Albanese","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193207"},{"key":"ref3","article-title":"Honeypots: Tracking Hackers","author":"spitzner","year":"2002","journal-title":"Addison-Wesley"},{"key":"ref10","article-title":"Modeling deception in information security as a hypergame","author":"gutierrez","year":"2015","journal-title":"The 16th Annual Information Security Symposium"},{"key":"ref6","article-title":"From patches to honeypatches: lightweight attacker misdirection, deception and disinformation","author":"araujo","year":"2014","journal-title":"Proceedings of ACS CCS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516671"},{"key":"ref8","article-title":"ACyDS, An Adaptive Cyber Deception System","author":"chiang","year":"2016","journal-title":"MILCOM"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44598-6","article-title":"The security of Chaffing and winnowing,&#x201D; Advances in Cryptography - AsiaCrypt 2000","volume":"1976","author":"bellare","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"article-title":"10 amazing and successful military deception operations","year":"0","author":"kantor","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"article-title":"The greatest deception in military history","year":"0","author":"rowe","key":"ref1"}],"event":{"name":"MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2018,10,29]]},"location":"Los Angeles, CA, USA","end":{"date-parts":[[2018,10,31]]}},"container-title":["MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8580348\/8599678\/08599755.pdf?arnumber=8599755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T01:25:19Z","timestamp":1643160319000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8599755\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/milcom.2018.8599755","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}