{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T20:59:06Z","timestamp":1774558746934,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"IRC for Intelligent Secure Systems"},{"DOI":"10.13039\/501100004055","name":"King Fahd University of Petroleum and Minerals","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004055","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cybersecurity Authority"},{"name":"Cybersecurity Research and Innovation Pioneers Initiative","award":["CRPG-25-2065"],"award-info":[{"award-number":["CRPG-25-2065"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Comput. Soc."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/ojcs.2026.3669021","type":"journal-article","created":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T20:58:14Z","timestamp":1772485094000},"page":"574-586","source":"Crossref","is-referenced-by-count":0,"title":["Toward Realistic and Efficient Cyber Deception"],"prefix":"10.1109","volume":"7","author":[{"given":"Hind","family":"Alrubaish","sequence":"first","affiliation":[{"name":"King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0976-9962","authenticated-orcid":false,"given":"Walid","family":"Aljoby","sequence":"additional","affiliation":[{"name":"King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3709-6791","authenticated-orcid":false,"given":"Ahmed","family":"Aldeek","sequence":"additional","affiliation":[{"name":"King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9063-0123","authenticated-orcid":false,"given":"Mohammed","family":"Alkubaish","sequence":"additional","affiliation":[{"name":"King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1946-1790","authenticated-orcid":false,"given":"Daisuke","family":"Mashima","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]}],"member":"263","reference":[{"key":"ref1","article-title":"A comprehensive survey on cyber deception techniques to improve honeypot performance","volume-title":"Comput. Secur.","volume":"140","author":"Javadpour","year":"2024"},{"issue":"1","key":"ref2","article-title":"Advancing cybersecurity with honeypots and deception strategies","volume-title":"Informatics","volume":"12","author":"Mori","year":"2025"},{"key":"ref3","article-title":"A survey of contemporary open-source honeypots, frameworks, and tools","volume-title":"J. Netw. Comput. Appl.","volume":"220","author":"Ilg","year":"2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56538-5_13"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm57358.2023.10333917"},{"issue":"4","key":"ref6","first-page":"282","article-title":"Design of network security projects using honeypots","volume":"20","author":"Sadasivam","year":"2005","journal-title":"J. Comput. Sci. Colleges"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564645"},{"key":"ref8","first-page":"0547","article-title":"Beyond static defense: Dynamic honeypots for proactive threat engagement","volume-title":"Proc. IEEE 18th Int. Symp. Appl. Comput. Intell. Inform.","author":"Hegeds","year":"2024"},{"key":"ref9","article-title":"A taxonomy for dynamic honeypot measures of effectiveness","author":"Pittman","year":"2020"},{"key":"ref10","article-title":"PrimerA tool for testing honeypot measures of effectiveness","author":"Pittman","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106669"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3560828.3564006"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3604993"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm65349.2025.11204583"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/icocics58778.2023.10276639"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT58202.2023.10262465"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13020361"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2025.111327"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/OAJPE.2025.3577012"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3591024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LCN60385.2024.10639792"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2025.104458"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-025-03880-2"},{"key":"ref24","article-title":"Openssh","year":"2025"},{"key":"ref25","article-title":"Cowrie: SSH and telnet honeypot","year":"2024"},{"key":"ref26","article-title":"kippo: SSH honeypot","year":"2023"},{"key":"ref27","article-title":"sshesame: SSH honeypot","year":"2023"},{"key":"ref29","article-title":"NodeFTP: FTP honeypot","year":"2023"},{"key":"ref30","article-title":"FTPhoneypot: FTP honeypot","year":"2014"},{"key":"ref31","article-title":"Honeypots: 30 honeypots","year":"2025"},{"key":"ref32","article-title":"postfix","year":"2025"},{"key":"ref33","article-title":"Mailoney: SMTP honeypot","year":"2025"},{"key":"ref34","article-title":"SMTpot: SMTP honeypot","year":"2023"},{"key":"ref35","article-title":"apache","year":"2025"},{"key":"ref36","article-title":"Glastopf: Http honeypot","year":"2023"},{"key":"ref37","article-title":"Honeyhttpd: Http honeypot","year":"2025"},{"key":"ref38","article-title":"Technitium","year":"2025"},{"key":"ref39","article-title":"DNSChef: DNS honeypot","year":"2019"},{"key":"ref40","article-title":"INetSim: DNS honeypot","year":"2016"},{"key":"ref41","first-page":"113","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","volume-title":"Proc. 6th Int. Conf. Inf. Warfare Secur.","author":"Hutchins","year":"2011"},{"key":"ref42","article-title":"The diamond model of intrusion analysis","volume-title":"Center Cyber Intell. Anal. Threat Res.","author":"Caltagirone","year":"2013"},{"key":"ref43","article-title":"Using openssh to secure communication","year":"2024"},{"key":"ref44","article-title":"Web server usage statistics: Apache http server","year":"2024"},{"key":"ref45","article-title":"Proftpd basic - Debian package repository","year":"2024"},{"key":"ref46","article-title":"Technitium DNS server - Github repository","year":"2024"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-025-01227-1"},{"key":"ref48","first-page":"85","article-title":"Bitter harvest: Systematically fingerprinting low- and medium-interaction honeypots at internet scale","volume-title":"Proc. 12th USENIX Workshop Offensive Technol.","author":"Alexander","year":"2018"}],"container-title":["IEEE Open Journal of the Computer Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782664\/11319293\/11417710.pdf?arnumber=11417710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:53:02Z","timestamp":1774554782000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11417710\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/ojcs.2026.3669021","relation":{},"ISSN":["2644-1268"],"issn-type":[{"value":"2644-1268","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}