{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T18:54:04Z","timestamp":1764356044757,"version":"3.46.0"},"reference-count":13,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE1255832"],"award-info":[{"award-number":["DGE1255832"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1900873","CNS-1703592","CNS-2039146","CNS-2106517","CNS-2312709","CNS-2319367"],"award-info":[{"award-number":["CNS-1900873","CNS-1703592","CNS-2039146","CNS-2106517","CNS-2312709","CNS-2319367"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/msec.2025.3603410","type":"journal-article","created":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:34:19Z","timestamp":1757612059000},"page":"51-57","source":"Crossref","is-referenced-by-count":0,"title":["Clouds Are Where the (Security) Action Is: Have Honeypots Been Left in the Dust?"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2197-9137","authenticated-orcid":false,"given":"Eric","family":"Pauley","sequence":"first","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Blacksburg, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7874-1819","authenticated-orcid":false,"given":"Paul","family":"Barford","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, University of Wisconsin&#x2013;Madison, Madison, WI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2091-7484","authenticated-orcid":false,"given":"Patrick","family":"McDaniel","sequence":"additional","affiliation":[{"name":"School of Computer, Data, and Information Sciences, University of Wisconsin&#x2013;Madison, Madison, WI, USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"359","article-title":"How long do vulnerabilities live in the code? A large-scale empirical measurement study on FOSS vulnerability lifetimes,","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Alexopoulos","year":"2022"},{"key":"ref2","first-page":"167","article-title":"The internet motion sensor  A distributed blackhole monitoring system","volume-title":"Proc. NDSS Symp.","author":"Bailey","year":"2005"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/3041008.3041009"},{"volume-title":"CVE Program Mission","year":"2025","key":"ref4"},{"key":"ref5","first-page":"605","article-title":"ZMap: Fast internet-wide scanning and its security applications","volume-title":"Proc. 22nd USENIX Conf. Secur. (SEC)","author":"Durumeric","year":"2013"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/3477431"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/3133956.3134072"},{"volume-title":"Advancing digital opportunity and discovery","year":"2025","key":"ref8"},{"key":"ref9","first-page":"5989","article-title":"DSCOPE: A cloud-native internet telescope","volume-title":"Proc. 32nd USENIX Secur. Symp. (SEC)","author":"Pauley","year":"2023"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/3618257.3624810"},{"key":"ref11","first-page":"1","article-title":"A virtual honeypot framework","volume-title":"Proc. 13th Conf. USENIX Secur. Symp. (SSYM)","author":"Provos","year":"2004"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/3355369.3355595"},{"key":"ref13","first-page":"17","article-title":"Using honeynets for internet situational awareness","volume-title":"Proc. 4th Workshop Hot Topics Netw. (HotNets IV)","author":"Yegneswaran","year":"2005"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8013\/11269917\/11159550-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8013\/11269917\/11159550.pdf?arnumber=11159550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T18:45:02Z","timestamp":1764355502000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11159550\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":13,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/msec.2025.3603410","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"type":"print","value":"1540-7993"},{"type":"electronic","value":"1558-4046"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}