{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T15:46:01Z","timestamp":1744040761635,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/ntms.2018.8328709","type":"proceedings-article","created":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T16:44:07Z","timestamp":1522687447000},"page":"1-4","source":"Crossref","is-referenced-by-count":9,"title":["On the Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Fraunholz","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Krohmer","sequence":"additional","affiliation":[]},{"given":"Frederic","family":"Pohl","sequence":"additional","affiliation":[]},{"given":"Hans Dieter","family":"Schotten","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","article-title":"The art of port scanning","volume":"7","author":"vaskovich","year":"1997","journal-title":"Phrack Magazine"},{"key":"ref33","article-title":"A security mechanism for web servers based on deception","author":"katsinis","year":"2012","journal-title":"International Conference on Internet Computing"},{"key":"ref32","article-title":"Defending web servers with feints, distraction and obfuscation","author":"fraunholz","year":"2018","journal-title":"International Conference on Computing Networking and Communications"},{"journal-title":"Applying deception mechanisms for detecting for sophisticated cyber attacks A research paper by topspin security","year":"0","author":"zohar","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.22619\/IJCSA.2017.100113"},{"journal-title":"Mirai-Source-Code","year":"2016","author":"anna-senpai","key":"ref37"},{"journal-title":"A review on artificial intelligence techniques for developing intelligent honeypot","year":"2012","author":"zakaria","key":"ref36"},{"key":"ref35","article-title":"A review of dynamic and intelligent honeypots","author":"zakaria","year":"2013","journal-title":"ScienceAsia 39S"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890056"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.92"},{"key":"ref11","article-title":"Buffer overflows: Attacks and defenses for the vulnerability of the decade","author":"cowan","year":"2013","journal-title":"Foundations of Intrusion Tolerant Systems"},{"journal-title":"Modsecurity","year":"2017","author":"spiderlabs","key":"ref12"},{"journal-title":"Dcept An open-source honeytoken tripwire","year":"2016","author":"stewart","key":"ref13"},{"journal-title":"The Art of War ser Mens sana","year":"2001","author":"sun","key":"ref14"},{"journal-title":"The Cuckoo's Egg Tracking a Spy Through the Maze of Computer Espionage","year":"1989","author":"stoll","key":"ref15"},{"journal-title":"Dlp and honeytokens","year":"2007","author":"de barros","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.435"},{"key":"ref18","article-title":"Honey sheets: What happens to leaked google spreadsheets?","volume":"9","author":"lazarov","year":"2016","journal-title":"Proc of USENIX Cyber Security Experimentation and Test (CSET) Workshop"},{"key":"ref19","first-page":"1","article-title":"Implementation of honeytoken module in dbms oracle 9ir2 enterprise edition for internal malicious activity detection","author":"cenys","year":"2005","journal-title":"IEEE Computer Society's TC on Security and Privacy"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2012.6222760"},{"journal-title":"The future of cybercrime & security Financial & corporate threats & mitigation 2015-2020","year":"2015","key":"ref4"},{"key":"ref27","article-title":"Detecting malicious insiders in military networks","author":"maybury","year":"2006","journal-title":"MIL-COM"},{"key":"ref3","article-title":"Paypal's security breach highlights our dependence on others","volume":"28","author":"clapperton","year":"2016","journal-title":"newstatesman"},{"journal-title":"Mandiant Trend Report","year":"0","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.23919\/SOFTCOM.2017.8115550"},{"journal-title":"2015 Internet Crime Report","year":"2015","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2017.7943186"},{"journal-title":"Die lage der it-sicherheit in deutschland 2014","article-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik","year":"2014","key":"ref7"},{"key":"ref2","article-title":"The administrator of the dark web's infamous hacking market has vanished: The admin of the real deal has been quiet since june","volume":"3","author":"cox","year":"2016","journal-title":"Vice Motherboard"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2017.8074855"},{"key":"ref1","article-title":"New n. s. a. breach linked to popular russian antivirus software","volume":"5","author":"shane","year":"2017","journal-title":"The New York Times"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(09)70123-0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516671"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.733"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CYCON.2014.6916397"},{"key":"ref23","article-title":"Honeygen: an automated honey tokens generator","author":"bercovitch","year":"2011","journal-title":"International Conference on Intelligence and Security Informatics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137315"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2017.34"}],"event":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2018,2,26]]},"location":"Paris","end":{"date-parts":[[2018,2,28]]}},"container-title":["2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8327376\/8328663\/08328709.pdf?arnumber=8328709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T19:47:18Z","timestamp":1524512838000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8328709\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/ntms.2018.8328709","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}