{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:27:02Z","timestamp":1765546022963},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/mipro.2015.7160478","type":"proceedings-article","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T18:02:26Z","timestamp":1437069746000},"page":"1313-1317","source":"Crossref","is-referenced-by-count":16,"title":["Honeytokens as active defense"],"prefix":"10.1109","author":[{"given":"A.B. Robert","family":"Petrunic","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"The Use of Honeytokens in Database Security","author":"ross","year":"0","journal-title":"Atiner's conference"},{"key":"ref3","article-title":"Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams","author":"mcraea","year":"2007","journal-title":"Journal of Digital Forensic Practice"},{"year":"0","key":"ref6","article-title":"Global.asax file"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.611"},{"journal-title":"Detecting Attacks on Web Applications from Log Files","year":"2008","author":"meyer","key":"ref7"},{"key":"ref2","article-title":"Importance of Web Application Firewall technology for Protecting Web-based Resources","author":"hacker","year":"2008","journal-title":"ICSA Labs an Independent Verizon Business"},{"year":"2013","key":"ref1","article-title":"OWASP Top 10"}],"event":{"name":"2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2015,5,25]]},"location":"Opatija, Croatia","end":{"date-parts":[[2015,5,29]]}},"container-title":["2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7153596\/7160221\/07160478.pdf?arnumber=7160478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T17:21:01Z","timestamp":1490376061000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7160478\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/mipro.2015.7160478","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}